Thanks. Looks like the internet banking scene here are not using OpenSSL. There are tools in the below link to check specific sites for vulnerability to the bug:sundaymorningstaple wrote:Local banks sites DBS, OCBC, StanChart are okay (I've not checked any others). Same for my US bank/CCs. But I've changed them all and Google Drive, Google+, Dropbox. Will get to the others as they crop up and I see okay's posted.
Remember, even if a site is okay, if you happened to use the same password as was used on a susceptible site. You still need to change it on the secure site as well.
It is pretty useless. It only tells you if it is vulnerable NOW but even if it is not, it still could have been just a while ago and your password might have been compromised.WillF wrote:Thanks. Looks like the internet banking scene here are not using OpenSSL. There are tools in the below link to check specific sites for vulnerability to the bug:sundaymorningstaple wrote:Local banks sites DBS, OCBC, StanChart are okay (I've not checked any others). Same for my US bank/CCs. But I've changed them all and Google Drive, Google+, Dropbox. Will get to the others as they crop up and I see okay's posted.
Remember, even if a site is okay, if you happened to use the same password as was used on a susceptible site. You still need to change it on the secure site as well.
http://sgtechtrooper.blogspot.sg/2014/0 ... apore.html
It's really the same difference, though, isn't it. Any given data field that has been malloc'ed contains the length of the field. Anything asking for more, could, and should be rejected. Seems like a big coding oversight.x9200 wrote:Technically it just reads too much without modifying anything in memory. Buffer overflow writes over some data often to execute specific tasks.Strong Eagle wrote:@zzm - is it really a buffer overrun exploit? I thought these kinds of things would have been patched up years ago.
Users browsing this forum: No registered users and 10 guests