If you run a server that uses SSL and the OpenSSL library, you need to update it. If you regularly visit a site that uses SSL (and I can’t imagine you don’t), you should try to limit your visits today. Once the dust has settled, we should all change our passwords. Pretty much everywhere.
In short, yesterday the OpenSSL Project released an update that addresses a vulnerability in the OpenSSL library. Officially named CVE-2014-0160, the Heartbleed bug has been around—and un-identified—for a long time. It’s not known if the vulnerability has been exploited, but it’s theoretically possible that someone has been snooping on transmissions we thought were secure. It’s very likely that bad guys are snooping on un-patched servers now, so be careful which services you log in to today.
Visit Heartbleed.com for a lot more information, and anyone running a server should consider these words from Cody Sorland:
Ubuntu servers running nginx/SSL?
sudo apt-get update && sudo apt-get dist-upgrade
sudo restart nginx
Do it now. #heartbleed
— Cody Soyland (@codysoyland) April 8, 2014
Be careful out there.
Just contacted my hosting provider and gave him a link to this article.
Thanks for posting.