=] you are wellcome


2014-04-14 3:48 GMT-03:00 Gayathri Manoj <gayathri.an...@gmail.com>:

> Thanks Roberto for the details information.
>
>
> On Mon, Apr 14, 2014 at 12:07 PM, Roberto Spadim <robe...@spadim.com.br>wrote:
>
>> more news:
>> https://www.openssl.org/news/
>>
>>
>> 2014-04-14 3:35 GMT-03:00 Roberto Spadim <robe...@spadim.com.br>:
>>
>> from what i know:
>>> https://www.openssl.org/news/secadv_20140407.txt
>>>
>>> OpenSSL Security Advisory [07 Apr 2014]
>>> ========================================
>>>
>>> TLS heartbeat read overrun (CVE-2014-0160)
>>> ==========================================
>>>
>>> A missing bounds check in the handling of the TLS heartbeat extension can be
>>> used to reveal up to 64k of memory to a connected client or server.
>>>
>>> Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
>>> 1.0.1f and 1.0.2-beta1.
>>>
>>> Thanks for Neel Mehta of Google Security for discovering this bug and to
>>> Adam Langley <a...@chromium.org> and Bodo Moeller <bmoel...@acm.org> for
>>> preparing the fix.
>>>
>>> Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
>>> upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.
>>>
>>> 1.0.2 will be fixed in 1.0.2-beta2.
>>>
>>>
>>>
>>> 2014-04-14 3:21 GMT-03:00 Gayathri Manoj <gayathri.an...@gmail.com>:
>>>
>>> Hi All,
>>>>
>>>> Please let me know is this vulnerability will effect the products which
>>>> are using openssl version less than openssl 1.0.1
>>>>
>>>> Thanks,
>>>> Gayathri
>>>>
>>>
>>>
>>>
>>> --
>>> Roberto Spadim
>>> SPAEmpresarial
>>> Eng. Automação e Controle
>>>
>>
>>
>>
>> --
>> Roberto Spadim
>> SPAEmpresarial
>> Eng. Automação e Controle
>>
>
>


-- 
Roberto Spadim
SPAEmpresarial
Eng. Automação e Controle

Reply via email to