Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Didier Stevens
Threat Level:
green
Date
Author
Title
OPENSSL CVE20103864
2010-11-16
Guy Bruneau
OpenSSL TLS Extension Parsing Race Condition
OPENSSL
2023-02-25/a>
Didier Stevens
Crypto Inside a Browser
2020-05-15/a>
Rob VandenBrink
SHA3 Hashes (on Windows) - Where Art Thou?
2019-10-22/a>
Bojan Zdrnja
Testing TLSv1.3 and supported ciphers
2018-11-27/a>
Xavier Mertens
More obfuscated shell scripts: Fake MacOS Flash update
2016-07-28/a>
Bojan Zdrnja
Verifying SSL/TLS certificates manually
2016-05-03/a>
Rick Wanner
OpenSSL Updates
2016-02-27/a>
Guy Bruneau
OpenSSL Security Update Planned for 1 March Release
2016-01-31/a>
Guy Bruneau
OpenSSL 1.0.2 Advisory and Update
2014-08-06/a>
Chris Mohan
OpenSSL Security Advisories http://www.openssl.org/news/secadv_20140806.txt
2014-06-12/a>
Johannes Ullrich
Metasploit now includes module to exploit CVE-2014-0195 (OpenSSL DTLS Fragment Vuln.)
2014-06-05/a>
Johannes Ullrich
Critical OpenSSL Patch Available. Patch Now!
2014-06-05/a>
Johannes Ullrich
Internet Storm Center Briefing on OpenSSL Vulnerabilities today at 12pm ET (8am PT/4pm UTC) https://www.sans.org/webcasts/98445
2014-06-05/a>
Johannes Ullrich
More Details Regarding CVE-2014-0195 (DTLS arbitrary code execution)
2014-06-05/a>
Johannes Ullrich
Updated OpenSSL Patch Presentation
2014-04-26/a>
Guy Bruneau
New Project by Linux Foundation - Core Infrastructure Initiative
2014-04-21/a>
Daniel Wesemann
OpenSSL Rampage
2014-04-21/a>
Daniel Wesemann
Finding the bleeders
2014-04-15/a>
Richard Porter
VMWare Advisory VMSA-2014-0004 - Updates on OpenSSL HeartBleed http://www.vmware.com/security/advisories/VMSA-2014-0004.html
2014-04-14/a>
Kevin Shortt
INFOCon Green: Heartbleed - on the mend
2014-04-11/a>
Johannes Ullrich
Tonight OpenSSL Webcast #4: Client Side Issues / What to tell your kids & managers about it https://www.sans.org/webcasts/side-heartbleed-client-vulnerabilities-98135
2014-04-08/a>
Guy Bruneau
OpenSSL CVE-2014-0160 Fixed
2014-04-08/a>
Johannes Ullrich
* Patch Now: OpenSSL "Heartbleed" Vulnerability
2014-01-02/a>
John Bambenek
OpenSSL.org Defaced by Attackers Gaining Access to Hypervisor
2013-12-29/a>
Russ McRee
OpenSSL suffers apparent defacement
2013-02-11/a>
John Bambenek
OpenSSL 1.0.1e Released with Corrected fix for CVE-2013-1069, more here: http://www.openssl.org/
2012-04-24/a>
Russ McRee
OpenSSL reissues fix for ASN1 BIO vulnerability
2012-04-19/a>
Kevin Shortt
OpenSSL Security Advisory - CVE-2012-2110
2012-03-12/a>
Guy Bruneau
OpenSSL Security Update
2011-11-07/a>
Rob VandenBrink
Stuff I Learned Scripting - Evaluating a Remote SSL Certificate
2010-11-16/a>
Guy Bruneau
OpenSSL TLS Extension Parsing Race Condition
2010-06-02/a>
Mark Hofman
OpenSSL version 1.0.0a released. This fixes a number of security issues. Don't forget a number of commercial appliances will be using this, so look for vendor updates soon.
2010-04-25/a>
Raul Siles
Manual Verification of SSL/TLS Certificate Trust Chains using Openssl
2010-03-29/a>
Adrien de Beaupre
OpenSSL V 1.0.0 released!
2010-02-26/a>
Rick Wanner
OpenSSL 0.9.8m released.
2010-01-19/a>
Jim Clausing
Apple Security Update 2010-001
2009-11-06/a>
Andre Ludwig
New version of OpenSSL released - OpenSSL 0.9.8l
2009-01-08/a>
Kyle Haugsness
BIND OpenSSL follow-up
2008-05-16/a>
Daniel Wesemann
INFOcon back to green
2008-05-15/a>
Bojan Zdrnja
Debian and Ubuntu users: fix your keys/certificates NOW
2008-05-15/a>
Bojan Zdrnja
INFOCon yellow: update your Debian generated keys/certs ASAP
2006-11-29/a>
Toby Kohlenberg
New Vulnerability Announcement and patches from Apple
CVE20103864
2010-11-16/a>
Guy Bruneau
OpenSSL TLS Extension Parsing Race Condition
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Learn
about the Internet Storm Center
and our
volunteer InfoSec handlers