OpenSSL TLS/DTLS Heartbeat Information Disclosure Vulnerability
Original Issue Date: April 10, 2014
Severity Rating: High
- OpenSSL versions 1.0.1 through 1.0.1f
- OpenSSL 1.0.2-beta
A vulnerability has been reported in OpenSSL, which could be exploited by a remote attacker to disclose potentially sensitive information.
The vulnerability is due to improper bounds checking while handling TLS/DTLS heartbeat extension packets. A remote attacker could exploit this vulnerability by submitting crafted TLS or DTLS heartbeat packets to an affected device to retrieve sensitive information, such as private keys, username and passwords, or contents of encrypted traffic from process memory. By leveraging this information, an attacker may be able to decrypt, spoof, or perform man-in-the-middle attacks.
Proof-of-concept code that exploits this vulnerability is publicly available.
Update to OpenSSL version 1.0.1g
OpenSSL 1.0.2 will be fixed in 1.0.2-beta2
- Service provider should consider Replacing the certificate after moving to a fixed version of OpenSSL.
- Users may change the sensitive credentials like usernames,passwords etc.
- Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.
- Consider the usage of Perfect Forward Secrecy (PFS) to minimize the damage in case of a secret key leakage.
The information provided herein is on "as is" basis, without warranty of any kind.
Email: email@example.com Phone: +91-11-24368572
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
6, CGO Complex, Lodhi Road,
New Delhi - 110 003