9 Apr
2014
9 Apr
'14
7:39 a.m.
There are snort signatures available to determine active exploitation.
http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
Th
On 10 April 2014 10:33, Jasper Bryant-Greene
On 10/04/2014, at 9:33 am, Scott Howard
wrote: Or the system you did update the libraries on, but forgot to restart the webserver to pickup the change?
Don’t forget to restart things other than web servers! The bug is exploitable through SMTP, IMAP, POP3, XMPP, etc as well...
-Jasper _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog