Jump to content

Security researcher says 300K servers still at risk from Heartbleed


sincity

Recommended Posts

Security researcher says 300K servers still at risk from Heartbleed

Wednesday marked one month since the public at large was made aware of the Heartbleed bug, but it's not time to celebrate mission accomplished quite yet.

Errata Security announced Thursday that more than 300,000 web servers remain vulnerable to Heartbleed, the OpenSSL bug that took a nasty bite out of internet security early last month.

Cybersecurity researcher Robert Graham conducted a scan of internet port 443 in early April after Heartbleed started making headlines and discovered 600,000 systems were vulnerable to the bug at the time.

This week, that number has fallen to precisely 318,329, which should be cause for some celebration, right? Not so fast, Graham says, although there's a silver lining to be found among those dark clouds.

Beating hearts

The OpenSSL security software responsible for Heartbleed includes a built-in "heartbeat" feature, although only a million of the systems supporting this option were actually in use as of last month.

Flash-forward to this week, and Graham has discovered 1.5 million systems supporting "heartbeat," with all but the roughly 300,000 cited above having shored up their defenses by patching the bug.

"This implies to me that the first response to the bug was to disable heartbeats, then later when people correctly patched the software, heartbeats were re-enabled," Graham elaborated in a blog post.

All told, the security expert found 28 million SSL-supported systems during his April scan, but the best news of all may be that the "vast majority" of those servers used software other than Heartbleed vulnerable OpenSSL in the first place.

  • Sit back and relax with our massive review of Sony's PS4!
mf.gif


rc.img
rc.img
rc.img

a2.imga2t.imgJ5kmpkmPYdQ
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.