Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-0160 PoC — OpenSSL 缓冲区错误漏洞

Source
Associated Vulnerability
Title:OpenSSL 缓冲区错误漏洞 (CVE-2014-0160)
Description:OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL的TLS和DTLS实现过程中的d1_both.c和t1_lib.c文件中存在安全漏洞,该漏洞源于当处理Heartbeat Extension数据包时,缺少边界检查。远程攻击者可借助特制的数据包利用该漏洞读取服务器内存中的敏感信息(如用户名、密码、Cookie、私钥等)。以下版本的OpenSSL受到
Readme
# cve-2014-0160-Yunfeng-Jiang

1. The reading course report
Reading_Course_Report.pdf

2. Detect tools
1). heartbleed.py (https://gist.github.com/eelsivart/10174134)
Usage: python heartbleed.py hostname
2). ssltest.py (https://github.com/Lekensteyn/pacemaker/blob/master/ssltest.py)
Usage: python ssltest.py hostname
3). check-ssl-heartbleed.pl ( https://github.com/noxxi/p5-ssl-tools/blob/master/check-ssl-heartbleed.pl)
perl check-ssl-heartbleed.pl hostname
3. Result
The result folder contains some results of the detect tools.
File Snapshot

[4.0K] /data/pocs/e27be8dd661a22eb7828264b00cca3cf597f1520 ├── [ 16K] check-ssl-heartbleed.pl ├── [ 18K] heartbleed.py ├── [810K] Reading Course Report.docx ├── [589K] Reading_Course_Report.pdf ├── [ 531] README.md ├── [4.0K] result │   ├── [ 16K] res1.txt │   ├── [3.3K] res2.txt │   ├── [1.9K] res3.txt │   ├── [2.0K] res4.txt │   ├── [2.0K] res5.txt │   ├── [ 74K] res6.txt │   ├── [ 74K] res7.txt │   ├── [ 74K] res8.txt │   ├── [ 74K] res9.txt │   └── [1008] results.txt └── [4.1K] ssltest.py 1 directory, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.