关联漏洞
标题:
OpenSSL 缓冲区错误漏洞
(CVE-2014-0160)
描述:OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL的TLS和DTLS实现过程中的d1_both.c和t1_lib.c文件中存在安全漏洞,该漏洞源于当处理Heartbeat Extension数据包时,缺少边界检查。远程攻击者可借助特制的数据包利用该漏洞读取服务器内存中的敏感信息(如用户名、密码、Cookie、私钥等)。以下版本的OpenSSL受到
描述
OpenSSL Heartbleed Bug CVE-2014-0160 Toolkit. Built with ❤ by Christopher Ngo.
介绍

# heartpatch.us (Under Construction) 
_Patching heartbleed openssl vulnerabilities on servers across the world wide web._
## Inspiration
>Heartbleed is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed may be exploited regardless of whether the vulnerable OpenSSL instance is running as a TLS server or client. It results from improper input validation (due to a missing bounds check) in the implementation of the TLS heartbeat extension. Thus, the bug's name derives from heartbeat. The vulnerability is classified as a buffer over-read, a situation where more data can be read than should be allowed.
>The Electronic Frontier Foundation, Ars Technica, and Bruce Schneier all deemed the Heartbleed bug "catastrophic". Forbes cybersecurity columnist Joseph Steinberg wrote:
Some might argue that Heartbleed is the worst vulnerability found (at least in terms of its potential impact) since commercial traffic began to flow on the Internet.
>On the day of disclosure, The Tor Project advised:
If you need strong anonymity or privacy on the Internet, you might want to stay away from the Internet entirely for the next few days while things settle.
For such a critical bug that was unvealed years ago in 2014, there are still far too many unpatched systems on the internet, not to mention systems off the internet. A Shodan (search engine of internet-connected things via service banners) search for vuln:cve-2014-0160 from 2019 revealed 91,063 devices on the internet were still running OpenSSL versions still vulnerable to this critical exploit. [Archived Report](https://web.archive.org/web/20190711082042/https://www.shodan.io/report/0Wew7Zq7)
|Nation|Vulnerable Servers Online |
|-|-|
|United States | 21,258 |
|China|8,655|
|Germany|5,647|
|Russian Federation|3,869|
|France|3,660|
|Korea, Republic of|3,407|
|Italy|2,858|
|Taiwan|2,639|
|Japan|2,368|
|United Kingdom|2,176|
## What it does
Heartpatch.us is a toolkit that includes modules to both scan and patch Heartbleed vulnerabilities.
## How it was built
From the main site, users are able to scan target servers to scan for Heartbleed vulnerability.
For servers not on the internet, users may use ssltest.sh to scan. From the report, unpatched servers are then prompted to run the patch script.
## Testing Instructions
Use the included Ubuntu 13.04 server virtual machine or docker containers to simulate Heartbleed vulnerable servers.
Nmap script can be used to scan for Heartbleed.
Metasploit MSFConsole has modules for exploitation.
## Attributes
Metasploit Heartbleed Exploit Auxillary Module
Nmap Project
Nmap ssl-heartbleed script: https://nmap.org/nsedoc/scripts/ssl-heartbleed.html
FiloSottile's Heartbleed Scanner written in the Go language: https://github.com/FiloSottile/Heartbleed
Official Red Hat offline scanner written in the Python language by Katie Stafford: https://web.archive.org/web/20140412152427/https://access.redhat.com/labs/heartbleed/heartbleed-poc.py
The logo of the heartbleed bug (CC0 license): https://en.wikipedia.org/wiki/Heartbleed#/media/File:Heartbleed.svg
The Bandaid Cross Asset: https://wikiclipart.com/bandaid-clipart_24416/
文件快照
[4.0K] /data/pocs/4dd6d1cc05e5d70ce02ffc8c17b83d4099ec4114
├── [ 13] CNAME
├── [ 28] _config.yml
└── [3.3K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。