Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-0160 PoC — OpenSSL 缓冲区错误漏洞

Source
Associated Vulnerability
Title:OpenSSL 缓冲区错误漏洞 (CVE-2014-0160)
Description:OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL的TLS和DTLS实现过程中的d1_both.c和t1_lib.c文件中存在安全漏洞,该漏洞源于当处理Heartbeat Extension数据包时,缺少边界检查。远程攻击者可借助特制的数据包利用该漏洞读取服务器内存中的敏感信息(如用户名、密码、Cookie、私钥等)。以下版本的OpenSSL受到
Description
Test CIDR blocks for CVE-2014-0160/Heartbleed
Readme
# coronary
![](http://share.amerine.net/heartbleed.png)

Tests CIDR blocks for OpenSSL [CVE-2014-0160][CVE] aka [Heartbleed][heartbleed].

Inspired by Jonathan Rudenberg's [heartbleeder][heartbleeder].

## Using

```shell
$ coronary 192.168.1.0/24
Scanning: 192.168.1.11/22
VULNERABLE - 192.168.1.71:443 has the heartbeat extension enabled and is vulnerable to CVE-2014-0160
SECURE - 192.168.1.119:443 does not have the heartbeat extension enabled
VULNERABLE - 192.168.1.72:443 has the heartbeat extension enabled and is vulnerable to CVE-2014-0160
VULNERABLE - 192.168.1.142:443 has the heartbeat extension enabled and is vulnerable to CVE-2014-0160
SECURE - 192.168.1.180:443 does not have the heartbeat extension enabled

```

## Installation

Build from the source using `go get` (e.g. `go get github.com/amerine/coronary`)

[CVE]: https://www.openssl.org/news/secadv_20140407.txt
[heartbleed]: http://heartbleed.com/
[heartbleeder]: https://github.com/titanous/heartbleeder
File Snapshot

[4.0K] /data/pocs/273c8e3aadb51bdeb23fc8e4846b2f9257b850d4 ├── [2.7K] coronary.go ├── [1.1K] LICENSE └── [ 979] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.