Heart drop of blood away? 2 0 million equipment is still under threat-vulnerability warning-the black bar safety net

2015-09-17T00:00:00
ID MYHACK58:62201567049
Type myhack58
Reporter 佚名
Modified 2015-09-17T00:00:00

Description

Heart drop of blood is already a thing of the past? NO! A lapse of more than a year after the infamous the heart of the blood security vulnerabilities and not completely disappeared, still the 2 0 million of network devices present a security threat. According to Shodan, the search results display, there are still hundreds of thousands of IOT devices present a security risk, Shodan founder John Matherly on twitter posted a map, listed above, the world is still affected by the security issues affecting the country: ! As the figure shows, 5 7 2 7 2 devices in the United States; Germany ranked second, is 2 1 0 6 0; China 1 1 3 0 0 station the presence of the heart blood vulnerability of the device; France fourth, 1 0 0 9 4 station; the UK followed by 9 1 2 5 Station. The HeartBleed vulnerability summary Heart drops of blood were first discovered in 2 0 1 4 years, at the time caused a lot of panic. The vulnerability can allow an attacker to use OpenSSL software library security vulnerability in steal on the target device password and other sensitive information. The Heartbleed vulnerability is due to failure in the memcpy()call to the injured user input as the length parameter before the correct boundary checking. The attacker can track the OpenSSL allocated 64KB of cache, will be beyond the necessary scope of the bytes of information copied to the cache which then returns the cached content, so that the victim's memory of the content will be in each 64KB speed leaked. A large number of devices is not Update Patch, you can still be attacked Despite the fact that many Internet users in the vulnerability disclosure after you have updated the software to fix the vulnerability, however, more than a year later, or is the effect, or is the software not too easy to patch, there are nearly 2 0 million of the equipment still affected by the vulnerability. Security consultant Graham Cluley pointed out: “Obviously, some of the manufacturers and the IT team did not update the loopholes in the system. I bet for sure some of the networking equipment in the presence of the heart drops blood holes.” Matherly pointed out that the administrator can use the Shodan search tool to check their networking equipment is still there the heart blood vulnerability. In addition to updating OpenSSL addition, administrators can also take further security measures: change the key, dump the session cookies.