Thanks Roberto for the details information.
On Mon, Apr 14, 2014 at 12:07 PM, Roberto Spadim <robe...@spadim.com.br>wrote: > more news: > https://www.openssl.org/news/ > > > 2014-04-14 3:35 GMT-03:00 Roberto Spadim <robe...@spadim.com.br>: > > from what i know: >> https://www.openssl.org/news/secadv_20140407.txt >> >> OpenSSL Security Advisory [07 Apr 2014] >> ======================================== >> >> TLS heartbeat read overrun (CVE-2014-0160) >> ========================================== >> >> A missing bounds check in the handling of the TLS heartbeat extension can be >> used to reveal up to 64k of memory to a connected client or server. >> >> Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including >> 1.0.1f and 1.0.2-beta1. >> >> Thanks for Neel Mehta of Google Security for discovering this bug and to >> Adam Langley <a...@chromium.org> and Bodo Moeller <bmoel...@acm.org> for >> preparing the fix. >> >> Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately >> upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS. >> >> 1.0.2 will be fixed in 1.0.2-beta2. >> >> >> >> 2014-04-14 3:21 GMT-03:00 Gayathri Manoj <gayathri.an...@gmail.com>: >> >> Hi All, >>> >>> Please let me know is this vulnerability will effect the products which >>> are using openssl version less than openssl 1.0.1 >>> >>> Thanks, >>> Gayathri >>> >> >> >> >> -- >> Roberto Spadim >> SPAEmpresarial >> Eng. Automação e Controle >> > > > > -- > Roberto Spadim > SPAEmpresarial > Eng. Automação e Controle >