namp检测heartbleed 心脏滴血
Posted mysticbinary
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了namp检测heartbleed 心脏滴血相关的知识,希望对你有一定的参考价值。
命令
nmap -sV --script=ssl-heartbleed 111.X.X.53 -p 443
输出结果
? ~ nmap -sV --script=ssl-heartbleed 111.X.X.53 -p 443
Starting Nmap 7.80 ( https://nmap.org ) at 2020-05-22 12:10 CST
Nmap scan report for 111.X.X.53
Host is up (0.040s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl/http nginx
| ssl-heartbleed:
| VULNERABLE:
| The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
| State: VULNERABLE
| Risk factor: High
| OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
|
| References:
| http://www.openssl.org/news/secadv_20140407.txt
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
|_ http://cvedetails.com/cve/2014-0160/
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.26 seconds
修复建议
- 若发现出现漏洞的服务器,立刻下线,避免其继续暴露敏感信息。
- 停止旧版本的SSL服务,升级新版SSL服务。
以上是关于namp检测heartbleed 心脏滴血的主要内容,如果未能解决你的问题,请参考以下文章
OpenSSL Heartbleed “心脏滴血”漏洞简单攻击示例
(CVE-2014-0160) OpenSSL 心脏滴血漏洞