Heartbleed-Vulnerability-IMAPS/EN: Unterschied zwischen den Versionen
(Die Seite wurde neu angelegt: „=== {{:{{PAGENAME}}/Headline}} === If the result is positive, there is no need for further action. If the result is negative, please read the following inst…“) |
|||
Zeile 1: | Zeile 1: | ||
+ | |||
=== {{:{{PAGENAME}}/Headline}} === | === {{:{{PAGENAME}}/Headline}} === | ||
Aktuelle Version vom 7. Mai 2020, 11:39 Uhr
Check for Heartbleed Vulnerability
If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.
Result positive | Not vulnerable to Heartbleed |
Result negativ | Vulnerable to Heartbleed |
Description | The server is vulnerable to heartbleed. This allows an attacker to read sensitive data from the server's memory, such as secret keys and e-mails. |
Background | Heartbleed is described as the most serious security vulnerability of all time and has existed since 2011. The vulnerability exists in a software called OpenSSL, which is designed to protect the communication of data on the Internet via the TLS security protocol. The gap in OpenSSL has already been closed for several years. |
Consequence | The server is vulnerable to an implementation vulnerability that allows an attacker to attack your server. |
Solution/Tips | In case of vulnerability, immediately install an update for your TLS implementation on your server. |