OpenSSL vulnerabilities: the Heartbleed Bug and Cupid
Keywords:Buffer Overflow, OpenSSL, Heartbeat Extension, EAP, The Heartbleed Bug, Cupid, Ethical Hacking Exercise
AbstractIn this paper we expose the importance of information security in today's context of fast technological evolution. Our main objective is to study one of the most recent security issue, discovered in the well-known OpenSSL cryptographic software library, named “the Heartbleed Bug”. This is a serious vulnerability of the Heartbeat Extension for the transport layer security protocols (TLS/DTLS) implementation in OpenSSL. This weakness allows remote attackers to obtain sensitive information (secret keys used for X.509 certificates, user credentials, instant messages, emails and other critical documents and communication) for applications such as web, email, instant messaging and some virtual private networks, which should be protected, under normal conditions, by the SSL/TLS encryption. Further, “Cupid”, shows that the bug can be used, with the same effect, against any device which implies Extensible Authentication Protocol (EAP) authentication mechanisms and a vulnerable version of OpenSSL. In addition we present guidelines, fixes and methods for preventing and managing possible attacks against vulnerable systems.
EC-Council, Ethical Hacking and Countermeasures CEH v8, 2013
Codenomicon Ltd., The Heartbleed Bug, www.heartbleed.com, April 2014
CVE-2014-0160, cve.mitre.org, 2014
OpenSSL Security Advisory, www.openssl.org/news/secadv_20140407.txt,April 2014
Seggelmann R., Tuexen M., Williams M., RFC6520 - Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension, IETF, tools.ietf.org/html/rfc6520, February 2012
Dierks T., Rascorla E., RFC5246 – The Transport Layer Security (TLS) Protocol Version 1.2, IETF, tools.ietf.org/html/rfc5246, August 2008
Rescorla E., Modadugu N., RFC6347 – Datagram Transport Layer Security Version 1.2, IETF, tools.ietf.org/html/rfc6347, January 2012
Williams C., Anatomy of OpenSSL’s Heartbleed: Just for bytes trigger horror bug, www.theregister.co.uk, April 2014
Ducklin P., Anatomy of a data leakage bug – the OpenSSL “heartbleed” buffer overflow, nakedsecurity.sophos.com, April 2014
Heartbleed OpenSSL – Information Leak Exploit, www.exploit-db.com/exploits/32791/, April 2014
Stevens D., Heartbleed Packet Capture and Heartbleed Packet Capture – Full TLS, blog.didierstevens.com, April 2014
Grangeia L., Heartbleed, Cupid and Wireless, www.sysvalue.com, May 2014
Grangeia L., Heartbleed && Wireless, www.slideshare.net/lgrangeia, May 2014
Wikipedia, Extensible Authentication Protocol, en.wikipedia.org, 2014
Wikipedia, hostapd, en.wikipedia.org, 2014
Wikipedia, wpa_supplicant, en.wikipedia.org, 2014
Goodin D., Meet “Cupid,” the Heartbleed attack that spawns “evil” Wi-Fi networks, astechnica.com, June 2014
How to Cite
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The author(s) is responsible for the correctness and legality of the paper content.
- Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.
- It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.
- The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.
JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://jmeds.eu.
Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice.