Tuesday, May 27, 2014

A to Z about Heartbleed bug



RECENTLY, the World Wide Web was undaunted with Heartbleed bug. In this edition, ITRealms had a test and brings to you the A to Z of Heartbleed bug to save you from possible attack, according to Cyberoam.
Cyberoam offers a free testing tool to find if a web server is vulnerable to the Heartbleed attack.
Heartbleed Vulnerability Test
As said by some of the experts at Cyberoam, its customers need not bleed over Heartbleed exploit equally known as CVE-2014-0160.
A test by ITRealms shows that you need to input a domain name also known as Uniform Resource Locator (URL) on the submission line at Cyberoam home page.
A URL, thus is an abbreviation of Uniform Resource Locator; known as web address, particularly when used with HyperText Transfer Protocol (HTTP), which is an application protocol for distributed, collaborative, hypermedia information systems. Hence, HTTP is the foundation of data communication for the World Wide Web.
However, after the input and the domain name does not seem to be vulnerable, customers were advised to go on with their lives normally, but in the case it does, they should use the remediation steps provided in the Cyberoam blog and remain up and running by keeping their server protected.
What is Heartbleed bug?
It is a bug in OpenSSL, a common encryption library used on web servers.
What can you do to stop it?
* Patch affected systems
* Update your Intrusion Prevention Systems (IPS) signatures to detect and block the vulnerability from being exploited.
How can you find out if a website is affected by this vulnerability?
Cyberoam offers a free testing tool to find if a web server is vulnerable to the Heartbleed attack, click here to test.
Are SSL related features on Cyberoam products affected?
All GA versions of Cyberoam Firmwares including 10.04.X, 10.02.X and 10.01.X are NOT vulnerable, as they use an unaffected version of the OpenSSL library.
The beta firmware versions 10.6.X are affected by this vulnerability. Please be sure to upgrade the Cyberoam firmware to the latest beta release candidate for 10.6 i.e. 10.6.1 RC-4.
As a Cyberoam customer, are you protected?
The Cyberoam Threat Research labs released IPS signature versions 3.11.61 and 5.11.61 last week to help customers protect themselves from the “C#Heartbleed” vulnerability being exploited against them. You can check/update the IPS Signatures version through the appliance admin GUI, at the System->Maintenance->Updates tab.
Signature(s) name: OpenSSL TLS DTLS Heartbeat Information Disclosure
Default Action: Drop
Cyberoam customers are required to enable the Cyberoam IPS policy on respective firewall rules.
What is OpenSSL?
The Open Secure Sockets Layer (OpenSSL) is a collaborative project effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library, based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson.
Bleed not over Heartbleed Abuse says Cyberoam:
The Heartbleed vulnerability is in the news, owing to the millions of passwords, credit card numbers and other personal information that may be at risk because of this vulnerability that exists in OpenSSL.
The Open Secure Sockets Layer (OpenSSL) is a collaborative project effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library, based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson.
What is the ‘Heartbleed vulnerability’?
The Heartbleed is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS encryption provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some Virtual Private Networks (VPNs).
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. (Source: http://heartbleed.com)
Affected OpenSSL versions
The affected versions of OpenSSL include OpenSSL 1.0.1 through 1.0.1f (inclusive). OpenSSL 1.0.1g, OpenSSL 1.0.0 branch and OpenSSL 0.9.8 branch are NOT vulnerable.
Vulnerable Program: The vulnerable programme source files are t1_lib.c and dl_both.c
Vulnerable Function: The vulnerable functions are tls1_process_heartbeat() and dtls1_process_heartbeat().
Technical Mechanism:
Secure Socket Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide security, authentication and data integrity for communication over TCP/IP networks. By using cryptography primitives such as symmetric key ciphers, cryptographically secure hash functions, and Public Key Infrastructure for asymmetric encryption/decryption and authentication, these protocols enable hosts to communicate securely over insecure networks.
Datagram Transport Layer Security (DTLS) is very similar to TLS, which is used for communication over the TCP transport layer, but includes among other features a retransmission mechanism to deal with the unreliable UDP transport layer.
TLS/DTLS are layered protocols. All data exchanged between the two endpoints are contained inside TLS/DTLS records, the bottom layer of the protocol stack.
An information disclosure vulnerability exists in OpenSSL. The vulnerable functions tls1_process_heartbeat() and dtls1_process_heartbeat() fail to validate the Payload length value while processing Heartbeat Request messages. While constructing a Heartbeat Response message the vulnerable code copies Payload length bytes starting from the Payload into a response buffer. If the Payload provided was less than Payload length bytes, memcpy will fill in the response buffer with memory contents past the Heartbeat Request message buffer in memory.
A remote unauthenticated attacker could exploit this vulnerability by sending multiple crafted Heartbeat messages to the target application. Successful exploitation would result in up to 64KB of memory disclosure.
Should Cyberoam users worry?
Cyberoam research on this vulnerability is completed by our research and development team. This vulnerability doesn’t affect the GA released version of Cyberoam appliances which includes 10.04. X, 10.02.X and 10.01.X, as they use a protected version of OpenSSL. The firmware versions 10.6.X are affected by this vulnerability. Please be sure to upgrade the Cyberoam appliance to the latest release candidate firmware for 10.6 i.e. 10.6.1 RC-4.
In addition, we have released IPS upgrades 3.11.61 and 5.11.61 to address “Heartbleed” exploit for all the Cyberoam GA and 10.6.X versions:
Signature(s) name: OpenSSL TLS DTLS Heartbeat Information Disclosure
Default Action: Drop
You can check/update the IPS Signatures version through the appliance admin GUI, at the System->Maintenance->Updates tab.
Cyberoam customers are required to apply the Cyberoam IPS policy on the respecting firewall rules.
Cyberoam has also released an exclusive Advisory on Heartbleed exploit, available here.
Apart from this, Cyberoam also recommends all users to not use any affected OpenSSL versions in their applications such as Web services etc.

No comments: