"Give it time and it will be used against servers soon enough." Reports ZDNet when citing the point of worry as 'In the case of OpenSSL 1.0.2, the first problem child is "ClientHello signals DoS (CVE-2015-0291)." '
The other serious bug, "RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)," is just as ugly and more insidious. This one builds on top of the FREAK/SMACK OpenSSL security hole. ZDNet
If you are using any of the following below you need to update immediately
- OpenSSL 1.0.1 users should upgrade to 1.0.1k.
- OpenSSL 1.0.0 users should upgrade to 1.0.0p.
- OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
the key point is to get every system, applications and mobile devices around you to the current state of updates and continually lookout for fresh updates.
No comments:
Post a Comment