Algo extra para los usuarios de Linux.
Patch your WHM/cPanel machine for heartbleed
Remenda tu WHM/cPanel del Heartbleed
You’ve certainly heard about Heartbleed by now. If not, you can read more about this vulnerability at Heartbleed.com. Continue reading this post to find out if you’re vulnerable, and how to patch your server.
Once you understand it, you’ll want to patch your system. If you’re running Centos 5, you don’t need to worry because it doesn’t have the version of OpenSSL that is vulnerable.
If you’re running Centos 6, read on and patch.
1. Run this test to see if you’re patched:
If you see the following output, you’re patched (skip to #3):
2. If you didn’t see the output above stating you are already patched, run ‘yum update’ to install the patch:
You’ll see some things scroll by, but noticeably this package in particular:
You can run that command from #1 if you like to ensure things went well.
3. Reboot the server (this is probably a good time to take advantage of any kernel updates that may have installed as well!)
4. If you’d like to test from the outside, you can use this test:
http://filippo.io/Heartbleed/
http://filippo.io/Heartbleed/
5. You’re done.. move on to the next server.
En Maracucho.
Remenda tu WHM/cPanel del Heartbleed
Seguro ya sabes del Hearbleed, si crees que la maquina es vulnerable al Heartbleed, has lo sigiente.
Si la cpu esta corriendo con Centos 5 no tiene problema, no hay vulnerabilidad en la version del OpenSSL
Sirve es para el Centos 6
1. Rueda esta prueba para ver si estas seguro
1
|
rpm -q --changelog openssl-1.0.1e-16.el6_5.7.x86_64 | grep -B 1 CVE-2014-0160
|
Si ves lo siguiente, salta hasta el paso #3
1
2
3
|
root@linuxbrigade.com [~]# rpm -q --changelog openssl-1.0.1e-16.el6_5.7.x86_64 | grep -B 1 CVE-2014-0160
* Mon Apr 07 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-16.7
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
|
2. Si no, rueda el 'yum update para instalar el parcheo
1
|
yum update
|
Veras algo, pero observa este en particular
1
2
|
openssl-1.0.1e-16.el6_5.7.x86_64.rpm
openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm
|
Puedes rodar el comando del #1 si quieres asegurarte de que todo ha ido bien.
3. Apaga y prende el servidor (esto es posiblemente una buena accion ya que ademas pueden instalarse los updates nuevos, necesarios siempre)
4. Si quieres probarlo desde otra fuente, una fuente de afuera, prueba esta pagina:
5. Estais listo...muevete al proximo servidor.