network background popup

DOSarrest Systems fully patched for CVE-2014-0224 MITM OpenSSL Flaw

Jun 10th 2014

On June 5th, the OpenSSL project announced CVE-2014-0224, a vulnerability that enabled man-in-the-middle-attacks (MITM) and potentially allowed for the decryption and modification of data communication between client and server. A quick audit was ran by the DOSarrest team, and a subsequent set of upgrades to OpenSSL 1.0.0m was implemented without any disruption.

For further details on this latest OpenSSL flaw, you can visit this site. It is highly recommended to upgrade if your version of OpenSSL falls within the following areas:

OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.
OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.
OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.

Jag Bains

CTO, DOSarrest Internet Security

Added By : Jag Bains

DDoS Article Categories