{"id":70135,"date":"2014-06-24T19:09:55","date_gmt":"2014-06-24T23:09:55","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-25T21:49:13","modified_gmt":"2021-08-26T01:49:13","slug":"heartbleed-old-news-servers-still-vulnerable","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/heartbleed-old-news-servers-still-vulnerable\/","title":{"rendered":"Heartbleed Old News &#8211; Servers Still Vulnerable"},"content":{"rendered":"<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98205\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/facepalm1.jpg?resize=85%2C100&#038;ssl=1\" alt=\"\" width=\"85\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/facepalm1.jpg?w=95&amp;ssl=1 95w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/facepalm1.jpg?resize=64%2C75&amp;ssl=1 64w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/>Proof that data breaches like <a title=\"Code Spaces\" href=\"http:\/\/www.csoonline.com\/article\/2365062\/disaster-recovery\/code-spaces-forced-to-close-its-doors-after-security-incident.html\" target=\"_blank\" rel=\"noopener noreferrer\">Code Spaces<\/a>, <a title=\"P.F. Chang&#039;s\" href=\"https:\/\/www.databreachtoday.com\/pf-changs-confirms-card-breach-a-6953\" target=\"_blank\" rel=\"noopener noreferrer\">P.F.Chang&#8217;s<\/a>, <a title=\"Dimino&#039;s Pizza\" href=\"https:\/\/www.databreachtoday.com\/ransom-sought-in-dominos-pizza-breach-a-6957\" target=\"_blank\" rel=\"noopener noreferrer\">Domino&#8217;s<\/a>, <a title=\"Target\" href=\"http:\/\/krebsonsecurity.com\/2014\/05\/the-target-breach-by-the-numbers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Target<\/a>, <a title=\"Neiman Marcus\" href=\"https:\/\/www.databreachtoday.com\/neiman-marcus-searching-for-ciso-a-6929\" target=\"_blank\" rel=\"noopener noreferrer\">Neiman Marcus<\/a> continue to be inevitable<\/em>. <a title=\"The Verge\" href=\"http:\/\/www.theverge.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>The Verge<\/em><\/a>\u00a0is <a title=\"Over 300,000 servers remain vulnerable to Heartbleed after initial wave of patches\" href=\"http:\/\/www.theverge.com\/2014\/6\/22\/5831732\/over-300000-servers-vulnerable-to-heartbleed-two-months-later\" target=\"_blank\" rel=\"noopener noreferrer\">reporting<\/a> that the<strong> <a title=\"Heartbleed\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/Heartbleed\" target=\"_blank\" rel=\"noopener noreferrer\">Heartbleed<\/a> <a title=\"OpenSSL\" href=\"http:\/\/www.openssl.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Open SSL<\/a> bug<\/strong> is still running rampant. Despite the initial <strong>panic<\/strong> several months ago when\u00a0<span style=\"color: #252525; font-family: sans-serif; font-size: 14.399999618530273px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 17.920000076293945px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: #ffffff;\">Neel Mehta of\u00a0<\/span><a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google&#8217;s<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) security team discovered the major bug which put over a million web servers at risk, the threat is old news.<\/p>\n<h3>600,000 still vulnerable to Heartbleed<\/h3>\n<p><a href=\"https:\/\/web.archive.org\/web\/20230130163555\/https:\/\/heartbleed.com\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\" wp-image-98207 alignright\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartbleed.png?resize=90%2C109&#038;ssl=1\" alt=\"\" width=\"90\" height=\"109\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartbleed.png?resize=124%2C150&amp;ssl=1 124w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartbleed.png?resize=62%2C75&amp;ssl=1 62w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartbleed.png?w=341&amp;ssl=1 341w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>Being old news does not mean the problem&#8217;s solved according to the article. They cite security researcher <a title=\"Robert David Graham\" href=\"https:\/\/www.blogger.com\/profile\/09879238874208877740\" target=\"_blank\" rel=\"noopener noreferrer\">Robert David Graham<\/a> who found that at <strong>least 309,197 servers<\/strong> out there on the interwebs are still vulnerable to the exploit.<\/p>\n<p>Immediately after the announcement, Mr. Graham found some 600,000 servers were exposed by Heartbleed. One month after the bug was announced, that number\u00a0dropped down to 318,239. In the past month, only 9,042 of those servers have been <strong>patched to block Heartbleed<\/strong>. The author says that&#8217;s cause for concern because it means that smaller sites aren&#8217;t making the effort to implement a fix.<\/p>\n<h3>Affects the OpenSSL protocol<\/h3>\n<p><em><a href=\"https:\/\/web.archive.org\/web\/20191231171208\/http:\/\/stormforcemarine.com:80\/upgrade-your-boat-part-7.html\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\" wp-image-98209 alignright\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/HeadInSand-1.jpg?resize=90%2C121&#038;ssl=1\" alt=\"\" width=\"90\" height=\"121\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/HeadInSand-1.jpg?resize=112%2C150&amp;ssl=1 112w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/HeadInSand-1.jpg?resize=56%2C75&amp;ssl=1 56w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/HeadInSand-1.jpg?w=271&amp;ssl=1 271w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>The Verge<\/em> concludes that it&#8217;s likely that the lightly trod corners of the internet will remain <strong>vulnerable for many years to come<\/strong>, as sites with sub-par security standards continue to leave themselves and their users exposed. The danger is particularly real now since the <strong>exploit has been widely publicized<\/strong>. The bug, which affects the OpenSSL protocol used widely online,\u00a0can cause some serious damage \u2014\u00a0it can be exploited to give hackers encryption keys, passwords, and other sensitive information.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I mean who do all these people think they are the <a title=\"National Security Agency\" href=\"http:\/\/en.wikipedia.org\/wiki\/National_Security_Agency\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">NSA<\/a>?<\/em><\/p>\n<p><em><a title=\"CNET\" href=\"http:\/\/www.cnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CNET<\/a> has kept a <a title=\"Heartbleed bug: Check which sites have been patched\" href=\"http:\/\/www.cnet.com\/how-to\/which-sites-have-patched-the-heartbleed-bug\/\" target=\"_blank\" rel=\"noopener noreferrer\">running list<\/a> of where you should <strong>change your password<\/strong> due to Heartbleed.<\/em><\/p>\n<ol>\n<li><em><a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>)<\/em><\/li>\n<li><em><a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> (<a title=\"NASDAQ : FB\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FB\/\" target=\"_blank\" rel=\"noopener noreferrer\">FB<\/a>)<\/em><\/li>\n<li><em><a title=\"YouTube\" href=\"http:\/\/www.youtube.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a><\/em><\/li>\n<li><em><a href=\"http:\/\/www.yahoo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yahoo<\/a> (<a href=\"https:\/\/www.tradingview.com\/chart\/YHOO\/EWjh1a3K-The-last-YHOO-chart-for-posterity-hello-AABA\/\" target=\"_blank\" rel=\"noopener noreferrer\">YHOO<\/a>)<\/em><\/li>\n<li><em><a title=\"Wikipedia\" href=\"http:\/\/www.wikipedia.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wikipedia<\/a><\/em><\/li>\n<li><em><a title=\"Bing\" href=\"http:\/\/www.bing.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bing<\/a><\/em><\/li>\n<li><em><a title=\"Pinterest\" href=\"https:\/\/www.pinterest.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pinterest<\/a><\/em><\/li>\n<li><em><a title=\"Instagram\" href=\"https:\/\/instagram.com\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a><\/em><\/li>\n<li><em><a title=\"Tumblr\" href=\"https:\/\/www.tumblr.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tumblr<\/a><\/em><\/li>\n<li><em><a title=\"ESPN\" href=\"http:\/\/espn.go.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ESPN<\/a><\/em><\/li>\n<li><em><a title=\"Netflix\" href=\"https:\/\/www.netflix.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">NetFlix<\/a><\/em><\/li>\n<li><em><a title=\"www.weather.com\" href=\"http:\/\/www.weather.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Weather.com<\/a><\/em><\/li>\n<li><em><a title=\"Dropbox\" href=\"https:\/\/www.dropbox.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dropbox<\/a><\/em><\/li>\n<li><em><a title=\"AT&amp;T\" href=\"http:\/\/www.att.com\/\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">AT&amp;T<\/a> (<a title=\"NYSE : T\" href=\"http:\/\/www.google.com\/finance?cid=33312\" target=\"_blank\" rel=\"noopener noreferrer\">T<\/a>)<\/em><\/li>\n<li><em><a href=\"https:\/\/www.okcupid.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">OKCupid<\/a><\/em><\/li>\n<\/ol>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20201112020055\/https:\/\/www.ehackingnews.com\/2014\/04\/heartbleed-openssl-vulnerability.html\" target=\"_blank\" rel=\"noopener noreferrer\">OpenSSL vulnerability allows hackers to read 64k of memory on target server<\/a> (ehackingnews.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>309,197 servers on the Intertubes are still vulnerable to the Heartbleed bug which affects the OpenSSL protocol.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,1795,1767,849,536,92,2160,2159,4],"class_list":["post-70135","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-breach","tag-bug","tag-data","tag-goog","tag-google","tag-heartbleed","tag-openssl","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=70135"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70135\/revisions"}],"predecessor-version":[{"id":131337,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70135\/revisions\/131337"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=70135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=70135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=70135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}