Solved

How can I identify EMERGING THREAT – OpenSSL “HeartBleed” Vulnerability in our Linux servers

Posted on 2014-04-09
3
328 Views
Last Modified: 2014-07-29
Please let me know the commands to verify if OpenSSL versions 1.0.1 through 1.0.1f are installed, running or being use in my Linux servers.I have 200 Linux servers and vm's
0
Comment
Question by:oo_tatang
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 48

Expert Comment

by:Tintin
ID: 39990667
To check the package versions depends on which Linux distro you are using.

To check the openssl version, just run

openssl version
0
 
LVL 29

Expert Comment

by:serialband
ID: 39990734
You can scan your server here:  http://filippo.io/Heartbleed/

There's more information about Heartbleed here: http://heartbleed.com/

Here's a howto:
http://www.howtoforge.com/find_out_if_server_is_affected_from_openssl_heartbleed_vulnerability_cve-2014-0160_and_how_to_fix

Just because you have the version, doesn't mean you are vulnerable.  You may be patched, if your distro released a compiled version without the heartbeat..  You can probably just grep for the variable in the lib to see if it exists or not.
egrep dtls1_process_heartbeat libssl.so.1.0.0

http://www.experts-exchange.com/OS/Linux/Q_28402987.html#a39987838
0
 
LVL 22

Accepted Solution

by:
blu earned 500 total points
ID: 39993964
Keep in mind that outgoing connections are potentially vulnerable too. Any process that uses OpenSSL to implement its SSL client functions is also vulnerable. And sometimes a package will include a private copy of OpenSSL so it may not be obvious that a particular packe is vulnerable and needs patching. You need to do an audit of your incoming and outgoing network connections and then identify the products making those connections and determine their risk. If your servers only accept incoming connections then your task is much easier. But if they connect to other systems on occasion, then you need to look at those client processes too.
0

Featured Post

Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Using 'screen' for session sharing, The Simple Edition Step 1: user starts session with command: screen Step 2: other user (logged in with same user account) connects with command: screen -x Done. Both users are connected to the same CLI sessio…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question