fbpx
Blog April 11, 2014

Security Update- Are You Protected from the "Heartbleed" bug?

Connectria’s engineers are aware of the vulnerability, dubbed “Heartbleed”, which is a concern of all users of OpenSSL.  The bug has the potential to expose private information that is stored in memory of the server.  It can allow attackers to read the memory of the systems using vulnerable versions of OpenSSL library (1.0.1 through 1.0.1f).

Specific communication has gone out to all of Connectria’s customers, but if you using another cloud service read on.

This is a vulnerability with the OpenSSL library and not a flaw with SSL/TLS.  If you are running Microsoft IIS you are not vulnerable.  If your application or web server is using a web service that uses the OpenSSL library, you will need to:

1. Identify if your web servers are running a vulnerable version of OpenSSL (1.0.1 through 1.0.2f).  If your version is older than 1.0.1, then you are not vulnerable and no action is required.
2. If your server is vulnerable, you will need to update to the latest version of OpenSSL 1.0.1g.
3. Generate a new Certificate Signing Request (CSR).
4. Reissue any SSL certificates for the affected server using the new CSR.
5.  Install new SSL certificate and test.
6.  Revoke any old SSL certificates that have been replaced.

If you would like to test your web services to see if you are affected, please visit our partner GeoTrust to check your site.

Related Resources

 
3 Reasons ISVs Need a Hosting Partner, Not Just a Host Provider
As an independent software vendor, or ISV, with a growing business to run, you need all the support you can get. Much of this comes…
 
What Could a GDPR Violation Mean for Your Business?
Roughly one-third of Connectria’s customers are either based in the EU or are doing business within the EU. For them, the risks of non-compliance with…
 
What is HITRUST Certification, and why does it matter?
Earlier this month, we announced that Connectria has, once again, passed all of its third-party certifications. For a complete list and a high-level look at…