Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140409082651.GA30552@zoho.com>
Date: Wed, 9 Apr 2014 08:26:51 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Subject: Re: OpenSSL 1.0.1 TLS/DTLS hearbeat information
 disclosure CVE-2014-0160

On Mon, Apr 07, 2014 at 09:43:46PM +0200, Tomas Hoger wrote:
> Hi!
> 
> There's a new OpenSSL release 1.0.1g that fixes information leak issue:
> 
> http://www.openssl.org/news/secadv_20140407.txt
> http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=96db902
> http://heartbleed.com/

The good folks at Nmap (specifically Patrik Karlsson) have written a
"heartbleed" detection script based on Jared Stafford's reproducer.

I've made minor tweaks and placed it here:

http://sf.net/projects/mancha/files/sec/ssl-heartbleed.nse

It works quite well - thanks Nmap.

--mancha

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.