OpenSSL vulnerabilities: the Heartbleed Bug and Cupid

Authors

  • Andrei-Sorin Jerca

Keywords:

Buffer Overflow, OpenSSL, Heartbeat Extension, EAP, The Heartbleed Bug, Cupid, Ethical Hacking Exercise

Abstract

In this paper we expose the importance of information security in today's context of fast technological evolution. Our main objective is to study one of the most recent security issue, discovered in the well-known OpenSSL cryptographic software library, named “the Heartbleed Bug”. This is a serious vulnerability of the Heartbeat Extension for the transport layer security protocols (TLS/DTLS) implementation in OpenSSL. This weakness allows remote attackers to obtain sensitive information (secret keys used for X.509 certificates, user credentials, instant messages, emails and other critical documents and communication) for applications such as web, email, instant messaging and some virtual private networks, which should be protected, under normal conditions, by the SSL/TLS encryption. Further, “Cupid”, shows that the bug can be used, with the same effect, against any device which implies Extensible Authentication Protocol (EAP) authentication mechanisms and a vulnerable version of OpenSSL. In addition we present guidelines, fixes and methods for preventing and managing possible attacks against vulnerable systems.

References

EC-Council, Ethical Hacking and Countermeasures CEH v8, 2013

Codenomicon Ltd., The Heartbleed Bug, www.heartbleed.com, April 2014

CVE-2014-0160, cve.mitre.org, 2014

OpenSSL Security Advisory, www.openssl.org/news/secadv_20140407.txt,April 2014

Seggelmann R., Tuexen M., Williams M., RFC6520 - Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension, IETF, tools.ietf.org/html/rfc6520, February 2012

Dierks T., Rascorla E., RFC5246 – The Transport Layer Security (TLS) Protocol Version 1.2, IETF, tools.ietf.org/html/rfc5246, August 2008

Rescorla E., Modadugu N., RFC6347 – Datagram Transport Layer Security Version 1.2, IETF, tools.ietf.org/html/rfc6347, January 2012

Williams C., Anatomy of OpenSSL’s Heartbleed: Just for bytes trigger horror bug, www.theregister.co.uk, April 2014

Ducklin P., Anatomy of a data leakage bug – the OpenSSL “heartbleed” buffer overflow, nakedsecurity.sophos.com, April 2014

Heartbleed OpenSSL – Information Leak Exploit, www.exploit-db.com/exploits/32791/, April 2014

Stevens D., Heartbleed Packet Capture and Heartbleed Packet Capture – Full TLS, blog.didierstevens.com, April 2014

Grangeia L., Heartbleed, Cupid and Wireless, www.sysvalue.com, May 2014

Grangeia L., Heartbleed && Wireless, www.slideshare.net/lgrangeia, May 2014

Wikipedia, Extensible Authentication Protocol, en.wikipedia.org, 2014

Wikipedia, hostapd, en.wikipedia.org, 2014

Wikipedia, wpa_supplicant, en.wikipedia.org, 2014

Goodin D., Meet “Cupid,” the Heartbleed attack that spawns “evil” Wi-Fi networks, astechnica.com, June 2014

Downloads

Published

2014-09-30

How to Cite

Jerca, A.-S. (2014). OpenSSL vulnerabilities: the Heartbleed Bug and Cupid. Journal of Mobile, Embedded and Distributed Systems, 6(3), 122-128. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/OpenSSL_Vulnerabilities%3A_the_Heartbleed_Bug_and_Cupid