[RndTbl] OpenSSL: patch it now!

Paul Sierks psierks at sierkstech.net
Thu Apr 10 19:03:58 CDT 2014

Regarding this attack, the main thing that could be compromised is the 
ssl private key. But other than that what else could be leaked? Anything 
in memory of the process / service being exploited. Passwords hashes 
possibly even plaintext for email, etc. As long as the process(es) in 
question aren't running as root, damage shouldn't be too bad. Things 
such as oh, the shadow file, or private ssh keys, still remaining safe. 
Hopefully I'm not missing anything with this vulnerability but if I am 
I'd sure like to know.


On 04/10/2014 06:28 PM, Adam Thompson wrote:
> Most SSL certificate providers are allowing their customers to revoke 
> & reissue certificates at no charge as long as none of the details 
> (including verification method) change.
> -Adam
> On April 10, 2014 6:04:18 PM CDT, Trevor Cordes <trevor at tecnopolis.ca> 
> wrote:
>     Most people have probably heard about this already, but if not, *patch
>     your OpenSSL now!* and restart your daemons.
>     CVE-2014-0160
>     http://arstechnica.com/security/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eavesdropping/
>     For some reason you (sometimes) have to reload that page a few times
>     before it actually loads.
>     This is the worst bug I've seen in like 10 years, insofar as you may have
>     been compromised already, but you don't (can't!) know it and they may be
>     sitting there with your keys, waiting to actually make use of them at a
>     later date.
>      From how I read it, the only way to be safe & sure is to make a new CSR
>     and buy a new SSL cert?  Or are the cert vendors going to offer a "redo"
>     for free?
>     ------------------------------------------------------------------------
>     Roundtable mailing list
>     Roundtable at muug.mb.ca
>     http://www.muug.mb.ca/mailman/listinfo/roundtable
> -- 
> Sent from my Android device with K-9 Mail. Please excuse my brevity.
> _______________________________________________
> Roundtable mailing list
> Roundtable at muug.mb.ca
> http://www.muug.mb.ca/mailman/listinfo/roundtable

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.muug.mb.ca/pipermail/roundtable/attachments/20140410/9725d6cf/attachment.html>

More information about the Roundtable mailing list