more news: https://www.openssl.org/news/
2014-04-14 3:35 GMT-03:00 Roberto Spadim <robe...@spadim.com.br>: > from what i know: > https://www.openssl.org/news/secadv_20140407.txt > > OpenSSL Security Advisory [07 Apr 2014] > ======================================== > > TLS heartbeat read overrun (CVE-2014-0160) > ========================================== > > A missing bounds check in the handling of the TLS heartbeat extension can be > used to reveal up to 64k of memory to a connected client or server. > > Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including > 1.0.1f and 1.0.2-beta1. > > Thanks for Neel Mehta of Google Security for discovering this bug and to > Adam Langley <a...@chromium.org> and Bodo Moeller <bmoel...@acm.org> for > preparing the fix. > > Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately > upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS. > > 1.0.2 will be fixed in 1.0.2-beta2. > > > > 2014-04-14 3:21 GMT-03:00 Gayathri Manoj <gayathri.an...@gmail.com>: > > Hi All, >> >> Please let me know is this vulnerability will effect the products which >> are using openssl version less than openssl 1.0.1 >> >> Thanks, >> Gayathri >> > > > > -- > Roberto Spadim > SPAEmpresarial > Eng. Automação e Controle > -- Roberto Spadim SPAEmpresarial Eng. Automação e Controle