Heartbleed bug in OpenSSL

Find more details and update instructions:

For more information about this vulnerability, please visit

Verify Vulnerability

Filippo Valsorda’s online tool: [button link=”http://filippo.io/Heartbleed/” color=”primary” class=”sys_btn”]Filippo Valsorda’s online tool[/button]

Qualys online SSL scanner: [button link=”https://www.ssllabs.com/ssltest/” color=”primary” class=”sys_btn”]Qualys online SSL scanner[/button]

Google Chrome’s extension: [button link=”https://chrome.google.com/webstore/detail/chromebleed/eeoekjnjgppnaegdjbcafdggilajhpic” color=”primary” class=”sys_btn”]Google Chrome’s extension[/button]

Check SSL Heartbea by Luke: [button link=”http://rehmann.co/projects/heartbeat/” color=”primary” class=”sys_btn”]Check SSL Heartbeat[/button]

LastPass: [button link=”https://lastpass.com/heartbleed/?h=” color=”primary” class=”sys_btn”]LastPass[/button]

* Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4

* Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11

* CentOS 6.5, OpenSSL 1.0.1e-15

* Fedora 18, OpenSSL 1.0.1e-4

* OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012)

* FreeBSD 8.4 (OpenSSL 1.0.1e) and 9.1 (OpenSSL 1.0.1c)

* NetBSD 5.0.2 (OpenSSL 1.0.1e)

* OpenSUSE 12.2 (OpenSSL 1.0.1c)

* Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14

* SUSE Linux Enterprise Server

mac Users

Verify

 Share!

 
comments powered by Disqus