The attack Exploits the implementation of the Heartbeat Protocol, a little-used TLS protocol extension
-DOPENSSL_NO_HEARTBEATSThis switch ensures that the defected code never gets executed.
All Heartbleed-vulnerable systems should immediately upgrade to OpenSSL 1.0.1g.
If you are not sure whether an application you want to access is Heartbleed vulnerable or not - try any one of the Heartbleed detector tools.
No action required if your application is not vulnerable.
If the application is vulnerable, wait for it to be patched with OpenSSL 1.0.1g. Once the patch is applied, all the users of such applications should follow the application's release documents from the service providers. Typically, steps to follow once the patch is applied are:
Before accessing any SSL/TLS application such as HTTPS, check to see if the application is vulnerable. Do not access or login to any affected sites.
Ensure all such vendors or enterprises related to
- based on 2015-04-29