Find more details and update instructions:
For more information about this vulnerability, please visit
-
AWS Security Bulletin page: https://aws.amazon.com/security/security-bulletins/
-
OpenSSL’s official advisory: www.openssl.org/news/secadv_20140407.txt/
-
The Heartbleed Bug: http://heartbleed.com/
Verify Vulnerability
Filippo Valsorda’s online tool: [button link=”http://filippo.io/Heartbleed/” color=”primary” class=”sys_btn”]Filippo Valsorda’s online tool[/button]
Qualys online SSL scanner: [button link=”https://www.ssllabs.com/ssltest/” color=”primary” class=”sys_btn”]Qualys online SSL scanner[/button]
Google Chrome’s extension: [button link=”https://chrome.google.com/webstore/detail/chromebleed/eeoekjnjgppnaegdjbcafdggilajhpic” color=”primary” class=”sys_btn”]Google Chrome’s extension[/button]
Check SSL Heartbea by Luke: [button link=”http://rehmann.co/projects/heartbeat/” color=”primary” class=”sys_btn”]Check SSL Heartbeat[/button]
LastPass: [button link=”https://lastpass.com/heartbleed/?h=” color=”primary” class=”sys_btn”]LastPass[/button]
* Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4
* Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11
* CentOS 6.5, OpenSSL 1.0.1e-15
* Fedora 18, OpenSSL 1.0.1e-4
* OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012)
* FreeBSD 8.4 (OpenSSL 1.0.1e) and 9.1 (OpenSSL 1.0.1c)
* NetBSD 5.0.2 (OpenSSL 1.0.1e)
* OpenSUSE 12.2 (OpenSSL 1.0.1c)
* Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14
* SUSE Linux Enterprise Server
mac Users
Verify