According to Mark J. Cox of OpenSSL, Neel Mehta of Google's security team privately reported Heartbleed to the OpenSSL team on 1 April 2014 11:09 UTC.
The bug was named by an engineer at Synopsys Software Integrity Group, a Finnish cyber security company that also created the bleeding heart logo, designed by a Finnish graphic designer Leena Kurjenniska, and launched an informational website, heartbleed.com. While Google's security team reported Heartbleed to OpenSSL first, both Google and Codenomicon discovered it independently at approximately the same time. Codenomicon reports 3 April 2014 as their date of discovery and their date of notification of NCSC-FI [fi] for vulnerability coordination.
At the time of disclosure, some 17% (around half a million) of the Internet's secure web servers certified by trusted authorities were believed to be vulnerable to the attack, allowing theft of the servers' private keys and users' session cookies and passwords. The Electronic Frontier Foundation, Ars Technica, and Bruce Schneier all deemed the Heartbleed bug "catastrophic". Forbes cybersecurity columnist Joseph Steinberg wrote:
By 9 May 2014, only 43% of affected web sites had reissued their security certificates. In addition, 7% of the reissued security certificates used the potentially compromised keys. Netcraft stated:
Anti-malware researchers also exploited Heartbleed to their own advantage in order to access secret forums used by cybercriminals. Studies were also conducted by deliberately setting up vulnerable machines. For example, on 12 April 2014, at least two independent researchers were able to steal private keys from an experimental server intentionally set up for that purpose by CloudFlare. Also, on 15 April 2014, J. Alex Halderman, a professor at University of Michigan, reported that his honeypot server, an intentionally vulnerable server designed to attract attacks in order to study them, had received numerous attacks originating from China. Halderman concluded that because it was a fairly obscure server, these attacks were probably sweeping attacks affecting large areas of the Internet.
In August 2014, it was made public that the Heartbleed vulnerability enabled hackers to steal security keys from Community Health Systems, the second-biggest for-profit U.S. hospital chain in the United States, compromising the confidentiality of 4.5 million patient records. The breach happened a week after Heartbleed was first made public.
Many major web sites patched the bug or disabled the Heartbeat Extension within days of its announcement, but it is unclear whether potential attackers were aware of it earlier and to what extent it was exploited.
Based on examinations of audit logs by researchers, it has been reported that some attackers may have exploited the flaw for at least five months before discovery and announcement. Errata Security pointed out that a widely used non-malicious program called Masscan, introduced six months before Heartbleed's disclosure, abruptly terminates the connection in the middle of handshaking in the same way as Heartbleed, generating the same server log messages, adding "Two new things producing the same error messages might seem like the two are correlated, but of course, they aren't."
The RFC 6520 Heartbeat Extension tests TLS/DTLS secure communication links by allowing a computer at one end of a connection to send a Heartbeat Request message, consisting of a payload, typically a text string, along with the payload's length as a 16-bit integer. The receiving computer then must send exactly the same payload back to the sender.
Heartbleed is therefore exploited by sending a malformed heartbeat request with a small payload and large length field to the vulnerable party (usually a server) in order to elicit the victim's response, permitting attackers to read up to 64 kilobytes of the victim's memory that was likely to have been used previously by OpenSSL. Where a Heartbeat Request might ask a party to "send back the four-letter word 'bird'", resulting in a response of "bird", a "Heartbleed Request" (a malicious heartbeat request) of "send back the 500-letter word 'bird'" would cause the victim to return "bird" followed by whatever 496 subsequent characters the victim happened to have in active memory. Attackers in this way could receive sensitive data, compromising the confidentiality of the victim's communications. Although an attacker has some control over the disclosed memory block's size, it has no control over its location, and therefore cannot choose what content is revealed.
The affected versions of OpenSSL are OpenSSL 1.0.1 through 1.0.1f (inclusive). Subsequent versions (1.0.1g and later) and previous versions (1.0.0 branch and older) are not vulnerable. Installations of the affected versions are vulnerable unless OpenSSL was compiled with -DOPENSSL_NO_HEARTBEATS.
The vulnerable program source files are t1_lib.c and d1_both.c and the vulnerable functions are tls1_process_heartbeat() and dtls1_process_heartbeat().
The problem can be fixed by ignoring Heartbeat Request messages that ask for more data than their payload need, as required by the RFC.
Version 1.0.1g of OpenSSL adds some bounds checks to prevent the buffer over-read. The test listed below was one introduced to determine whether a heartbeat request would trigger Heartbleed; it silently discards malicious requests.
if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC 6520 sec. 4 */
The data obtained by a Heartbleed attack may include unencrypted exchanges between TLS parties likely to be confidential, including any form post data in users' requests. Moreover, the confidential data exposed could include authentication secrets such as session cookies and passwords, which might allow attackers to impersonate a user of the service.
An attacker having gained authentication material may impersonate the material's owner after the victim has patched Heartbleed, as long as the material is accepted (for example, until the password is changed or the private key revoked). Heartbleed therefore constitutes a critical threat to confidentiality. However, an attacker impersonating a victim may also alter data. Indirectly, Heartbleed's consequences may thus go far beyond a confidentiality breach for many systems.
A survey of American adults conducted in April 2014 showed that 60 percent had heard about Heartbleed. Among those using the Internet, 39 percent had protected their online accounts, for example by changing passwords or canceling accounts; 29 percent believed their personal information was put at risk because of the Heartbleed bug; and 6 percent believed their personal information had been stolen.
Although the bug received more attention due to the threat it represents for servers, TLS clients using affected OpenSSL instances are also vulnerable. In what The Guardian therefore dubbed Reverse Heartbleed, malicious servers are able to exploit Heartbleed to read data from a vulnerable client's memory. Security researcher Steve Gibson said of Heartbleed that:
The stolen data could contain usernames and passwords. Reverse Heartbleed affected millions of application instances. Some of the vulnerable applications are listed in the "Software applications" section below.
Platform maintainers like the Wikimedia Foundation advised their users to change passwords.
Several services have been made available to test whether Heartbleed affects a given site. However, many services have been claimed to be ineffective for detecting the bug. The available tools include:
Other security tools have added support for finding this bug. For example, Tenable Network Security wrote a plugin for its Nessus vulnerability scanner that can scan for this fault. The Nmap security scanner includes a Heartbleed detection script from version 6.45.
After the vulnerability is patched, server administrators must address the potential breach of confidentiality. Because Heartbleed allowed attackers to disclose private keys, they must be treated as compromised; key pairs must be regenerated, and certificates that use them must be reissued; the old certificates must be revoked. Heartbleed also had the potential to allow disclosure of other in-memory secrets; therefore, other authentication material (such as passwords) should also be regenerated. It is rarely possible to confirm that a system which was affected has not been compromised, or to determine whether a specific piece of information was leaked.
Since it is difficult or impossible to determine when a credential might have been compromised and how it might have been used by an attacker, certain systems may warrant additional remediation work even after patching the vulnerability and replacing credentials. For example, signatures made by keys that were in use with a vulnerable OpenSSL version might well have been made by an attacker; this raises the possibility integrity has been violated, and opens signatures to repudiation. Validation of signatures and the legitimacy of other authentications made with a potentially compromised key (such as client certificate use) must be done with regard to the specific system involved.
Since Heartbleed threatened the privacy of private keys, users of a website which was compromised could continue to suffer from Heartbleed's effects until their browser is made aware of the certificate revocation or the compromised certificate expires. For this reason, remediation also depends on users making use of browsers that have up-to-date certificate revocation lists (or OCSP support) and honour certificate revocations.
The author of the change which introduced Heartbleed, Robin Seggelmann, stated that he missed validating a variable containing a length and denied any intention to submit a flawed implementation. Following Heartbleed's disclosure, Seggelmann suggested focusing on the second aspect, stating that OpenSSL is not reviewed by enough people. Although Seggelmann's work was reviewed by an OpenSSL core developer, the review was also intended to verify functional improvements, a situation making vulnerabilities much easier to miss.
The OpenSSL foundation's president, Steve Marquess, said "The mystery is not that a few overworked volunteers missed this bug; the mystery is why it hasn't happened more often." David A. Wheeler described audits as an excellent way to find vulnerabilities in typical cases, but noted that "OpenSSL uses unnecessarily complex structures, which makes it harder to both humans and machines to review." He wrote:
Paul Chiusano suggested Heartbleed may have resulted from failed software economics.
"Security Advisory – OpenSSL Heartbleed Vulnerability". Cyberoam. 11 April 2014. Archived from the original on 8 February 2018. Retrieved 8 February 2018. https://kb.cyberoam.com/default.asp?id=2909
Limer, Eric (9 April 2014). "How Heartbleed Works: The Code Behind the Internet's Security Nightmare". Gizmodo. Archived from the original on 11 November 2014. Retrieved 24 November 2014. https://gizmodo.com/how-heartbleed-works-the-code-behind-the-internets-se-1561341209
"CVE-2014-0160". Common Vulnerabilities and Exposures. Mitre. Archived from the original on 24 January 2018. Retrieved 8 February 2018. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
"CWE-126: Buffer Over-read (3.0)". Common Vulnerabilities and Exposures. Mitre. 18 January 2018. Archived from the original on 8 February 2018. Retrieved 8 February 2018. https://cwe.mitre.org/data/definitions/126.html
"CVE-2014-0160". Common Vulnerabilities and Exposures. Mitre. Archived from the original on 24 January 2018. Retrieved 8 February 2018. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
"AL14-005: OpenSSL Heartbleed Vulnerability". Cyber Security Bulletins. Public Safety Canada. 11 April 2014. Archived from the original on 8 February 2018. Retrieved 8 February 2018. https://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2014/al14-005-en.aspx
"Add heartbeat extension bounds check". git.openssl.org. OpenSSL. Retrieved 5 March 2019. https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3
Pretorius, Tracey (10 April 2014). "Microsoft Services unaffected by OpenSSL "Heartbleed" vulnerability". Microsoft. Archived from the original on 8 February 2018. Retrieved 8 February 2018. https://cloudblogs.microsoft.com/microsoftsecure/2014/04/10/microsoft-services-unaffected-by-openssl-heartbleed-vulnerability/
Leyden, John (20 May 2014). "AVG on Heartbleed: It's dangerous to go alone. Take this (an AVG tool)". The Register. Archived from the original on 23 January 2018. Retrieved 8 February 2018. https://www.theregister.co.uk/2014/05/20/heartbleed_still_prevalent/
Graham, Robert (21 June 2014). "300k servers vulnerable to Heartbleed two months later". Errata Security. Archived from the original on 23 June 2014. Retrieved 22 June 2014. http://blog.erratasec.com/2014/06/300k-vulnerable-to-heartbleed-two.html#.U6bXBWSSwyC
Shodan (23 January 2017). "Heartbleed Report (2017-01)". shodan.io. Archived from the original on 23 January 2017. Retrieved 10 July 2019. https://web.archive.org/web/20170123161742/https://www.shodan.io/report/DCPO7BkV
Schwartz, Mathew J. (30 January 2017). "Heartbleed Lingers: Nearly 180,000 Servers Still Vulnerable". Bank Info Security. Archived from the original on 11 July 2019. Retrieved 10 July 2019. https://www.bankinfosecurity.com/blogs/nonstop-heartbleed-nearly-200k-servers-still-vulnerable-p-2381
Mac Vittie, Lori (2 February 2017). "Friendly Reminder: App Security in the Cloud Is Your Responsibility". F5 Labs. Archived from the original on 11 July 2019. Retrieved 10 July 2019. https://www.f5.com/labs/articles/threat-intelligence/friendly-reminder-app-security-in-the-cloud-is-your-responsibility-24894
Carey, Patrick (10 July 2017). "Heartbleed's Heartburn: Why a 5 Year Old Vulnerability Continues to Bite". The Security Ledger. Archived from the original on 11 July 2019. Retrieved 10 July 2019. https://securityledger.com/2017/07/heartbleeds-heartburn-why-a-5-year-old-vulnerability-continues-to-bite/
Shodan (11 July 2019). "[2019] Heartbleed Report". Shodan. Archived from the original on 11 July 2019. Retrieved 11 July 2019. https://www.shodan.io/report/0Wew7Zq7
Seggelmann, Robin; Tuexen, Michael; Williams, Michael (February 2012). Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. IETF. doi:10.17487/RFC6520. ISSN 2070-1721. RFC 6520. Retrieved 8 February 2018. https://datatracker.ietf.org/doc/html/rfc6520
Grubb, Ben (11 April 2014). "Man who introduced serious 'Heartbleed' security flaw denies he inserted it deliberately". The Sydney Morning Herald.[permanent dead link] https://www.smh.com/it-pro/security-it/man-who-introduced-serious-heartbleed-security-flaw-denies-he-inserted-it-deliberately-20140410-zqta1.html
"#2658: [PATCH] Add TLS/DTLS Heartbeats". OpenSSL. 2011. Archived from the original on 8 August 2017. Retrieved 13 April 2014. https://web.archive.org/web/20170808193401/https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=2658
"Meet the man who created the bug that almost broke the Internet". Globe and Mail. 11 April 2014. Archived from the original on 4 January 2018. Retrieved 27 August 2017. https://www.theglobeandmail.com/news/national/meet-the-man-that-created-the-bug-that-almost-broke-the-internet/article17941003/
"Heartbleed Bug". 11 October 2023. Archived from the original on 7 April 2014. Retrieved 9 April 2014. http://heartbleed.com/
Goodin, Dan (8 April 2014). "Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping". Ars Technica. Archived from the original on 5 July 2017. Retrieved 14 June 2017. https://arstechnica.com/security/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eavesdropping/
"Mark J Cox – #Heartbleed". Archived from the original on 16 April 2014. Retrieved 12 April 2014. https://plus.google.com/+MarkJCox/posts/TmCbp3BhJma
Pitkänen, Perttu (10 April 2014). "Oululaiset sorvasivat nimen ja logon: Näin superbugi tuotteistettiin" [The people of Oulu turned the name and logo: This is how the superbug was produced]. Ilta-Sanomat (in Finnish). Retrieved 11 October 2023. https://www.is.fi/digitoday/tietoturva/art-2000001832843.html
Dewey, Caitlin. "Why is it called the 'Heartbleed Bug'?". Archived from the original on 9 October 2014. Retrieved 25 November 2014. https://www.washingtonpost.com/blogs/style-blog/wp/2014/04/09/why-is-it-called-the-heartbleed-bug/
Lee, Timothy B. (10 April 2014). "Who discovered the vulnerability?". Vox. Archived from the original on 5 December 2017. Retrieved 4 December 2017. https://www.vox.com/cards/heartbleed/who-discovered-the-vulnerability
Lee, Ariana (13 April 2014). "How Codenomicon Found The Heartbleed Bug Now Plaguing The Internet". ReadWrite. Archived from the original on 5 September 2017. Retrieved 4 December 2017. Discovered independently by Google engineer Neel Mehta and the Finnish security firm Codenomicon, Heartbleed has been called 'one of the most serious security problems to ever affect the modern web.' https://readwrite.com/2014/04/13/heartbleed-security-codenomicon-discovery/
"Näin suomalaistutkijat löysivät vakavan vuodon internetin sydämestä – transl/Finnish researchers found a serious leakage of the heart of the Internet". 10 April 2014. Archived from the original on 4 November 2014. Retrieved 13 April 2014. http://www.digitoday.fi/tietoturva/2014/04/10/nain-suomalaistutkijat-loysivat-vakavan-vuodon-internetin-sydamesta/20145118/66?&n=2#commentsHere
Mutton, Paul (8 April 2014). "Half a million widely trusted websites vulnerable to Heartbleed bug". Netcraft. Archived from the original on 19 November 2014. Retrieved 24 November 2014. http://news.netcraft.com/archives/2014/04/08/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html
Perlroth, Nicole; Hardy, Quentin (11 April 2014). "Heartbleed Flaw Could Reach to Digital Devices, Experts Say". The New York Times. Archived from the original on 28 April 2019. Retrieved 27 February 2017. https://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html
Chen, Brian X. (9 April 2014). "Q. and A. on Heartbleed: A Flaw Missed by the Masses". The New York Times. Archived from the original on 12 April 2014. Retrieved 10 April 2014. https://bits.blogs.nytimes.com/2014/04/09/qa-on-heartbleed-a-flaw-missed-by-the-masses/
Wood, Molly (10 April 2014). "Flaw Calls for Altering Passwords, Experts Say". The New York Times. Archived from the original on 19 October 2017. Retrieved 27 February 2017. https://www.nytimes.com/2014/04/10/technology/flaw-calls-for-altering-passwords-experts-say.html
Manjoo, Farhad (10 April 2014). "Users' Stark Reminder: As Web Grows, It Grows Less Secure". The New York Times. Archived from the original on 24 February 2018. Retrieved 27 February 2017. https://www.nytimes.com/2014/04/10/technology/users-stark-reminder-as-web-grows-it-grows-less-secure.html
Zhu, Yan (8 April 2014). "Why the Web Needs Perfect Forward Secrecy More Than Ever". Electronic Frontier Foundation. Archived from the original on 20 December 2017. Retrieved 10 April 2014. https://www.eff.org/deeplinks/2014/04/why-web-needs-perfect-forward-secrecy
Goodin, Dan (8 April 2014). "Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style". Ars Technica. Archived from the original on 14 July 2017. Retrieved 14 June 2017. https://arstechnica.com/security/2014/04/critical-crypto-bug-exposes-yahoo-mail-passwords-russian-roulette-style/
"Schneier on Security: Heartbleed". Schneier on Security. 11 April 2014. Archived from the original on 23 December 2017. Retrieved 10 April 2014. https://www.schneier.com/blog/archives/2014/04/heartbleed.html
Steinberg, Joseph (10 April 2014). "Massive Internet Security Vulnerability – Here's What You Need To Do". Forbes. Archived from the original on 4 January 2018. Retrieved 29 August 2017. https://www.forbes.com/sites/josephsteinberg/2014/04/10/massive-internet-security-vulnerability-you-are-at-risk-what-you-need-to-do/
Kelion, Leo (11 April 2014). "US government warns of Heartbleed bug danger". BBC News. Archived from the original on 6 December 2018. Retrieved 21 June 2018. https://www.bbc.com/news/technology-26985818
"OpenSSL bug CVE-2014-0160". Tor Project. 7 April 2014. Archived from the original on 10 July 2017. Retrieved 9 April 2014. https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
Grubb, Ben (14 April 2014). "Heartbleed disclosure timeline: who knew what and when". The Sydney Morning Herald. Archived from the original on 25 November 2014. Retrieved 25 November 2014. https://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140415-zqurk.html
"heartbeat_fix". Archived from the original on 19 November 2018. Retrieved 14 April 2014. https://bugzilla.redhat.com/attachment.cgi?id=883475
""complete list of changes" (Git – openssl.git/commitdiff)". The OpenSSL Project. 7 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=96db902
Graham, Robert (21 June 2014). "300k servers vulnerable to Heartbleed two months later". Errata Security. Archived from the original on 23 June 2014. Retrieved 22 June 2014. http://blog.erratasec.com/2014/06/300k-vulnerable-to-heartbleed-two.html#.U6bXBWSSwyC
Shodan (23 January 2017). "Heartbleed Report (2017-01)". shodan.io. Archived from the original on 23 January 2017. Retrieved 10 July 2019. https://web.archive.org/web/20170123161742/https://www.shodan.io/report/DCPO7BkV
Schwartz, Mathew J. (30 January 2017). "Heartbleed Lingers: Nearly 180,000 Servers Still Vulnerable". Bank Info Security. Archived from the original on 11 July 2019. Retrieved 10 July 2019. https://www.bankinfosecurity.com/blogs/nonstop-heartbleed-nearly-200k-servers-still-vulnerable-p-2381
Mac Vittie, Lori (2 February 2017). "Friendly Reminder: App Security in the Cloud Is Your Responsibility". F5 Labs. Archived from the original on 11 July 2019. Retrieved 10 July 2019. https://www.f5.com/labs/articles/threat-intelligence/friendly-reminder-app-security-in-the-cloud-is-your-responsibility-24894
Carey, Patrick (10 July 2017). "Heartbleed's Heartburn: Why a 5 Year Old Vulnerability Continues to Bite". The Security Ledger. Archived from the original on 11 July 2019. Retrieved 10 July 2019. https://securityledger.com/2017/07/heartbleeds-heartburn-why-a-5-year-old-vulnerability-continues-to-bite/
"Heartbleed certificate revocation tsunami yet to arrive". Netcraft. 11 April 2014. Archived from the original on 29 May 2014. Retrieved 24 April 2014. http://news.netcraft.com/archives/2014/04/11/heartbleed-certificate-revocation-tsunami-yet-to-arrive.html
Mutton, Paul (9 May 2014). "Keys left unchanged in many Heartbleed replacement certificates!". Netcraft. Archived from the original on 27 August 2016. Retrieved 11 September 2016. https://news.netcraft.com/archives/2014/05/09/keys-left-unchanged-in-many-heartbleed-replacement-certificates.html
Kerner, Sean Michael (10 May 2014). "Heartbleed Still a Threat to Hundreds of Thousands of Servers". eWeek. Archived from the original on 11 May 2014. https://archive.today/20140511032609/http://www.eweek.com/security/heartbleed-still-a-threat-to-hundreds-of-thousands-of-servers.html
Prince, Matthew (17 April 2014). "The hidden costs of Heartbleed". Cloudflare. Archived from the original on 30 April 2016. https://archive.today/20160430071928/https://blog.cloudflare.com/the-hard-costs-of-heartbleed/
Evans, Pete (14 April 2014). "Heartbleed bug: 900 SINs stolen from Revenue Canada". CBC News. Archived from the original on 14 March 2018. Retrieved 4 November 2014. Some of the details are in the video linked from the page. http://www.cbc.ca/news/business/heartbleed-bug-rcmp-asked-revenue-canada-to-delay-news-of-sin-thefts-1.2609192
"Canada Revenue Agency pushes tax deadline to May 5 after Heartbleed bug". 14 April 2014. Archived from the original on 4 November 2014. Retrieved 4 November 2014. https://web.archive.org/web/20141104062708/http://www.ilstv.com/canada-revenue-agency-pushes-tax-deadline-to-may-5-after-heartbleed-bug/
Thibedeau, Hannah (16 April 2014). "Heartbleed bug accused charged by RCMP after SIN breach". CBC News. Archived from the original on 28 October 2014. Retrieved 4 November 2014. http://www.cbc.ca/news/politics/stephen-arthuro-solis-reyes-charged-in-heartbleed-related-sin-theft-1.2612526
"Heartbleed hack case sees first arrest in Canada". BBC News. 16 April 2014. Archived from the original on 23 May 2018. Retrieved 21 June 2018. https://www.bbc.com/news/technology-27058143
Kelion, Leo (14 April 2014). "Heartbleed hacks hit Mumsnet and Canada's tax agency". BBC News. Archived from the original on 29 November 2017. Retrieved 21 June 2018. https://www.bbc.co.uk/news/technology-27028101
"Mumsnet and Heartbleed as it happened". Mumsnet. Archived from the original on 29 December 2017. Retrieved 17 April 2014. https://web.archive.org/web/20171229112220/https://www.mumsnet.com/features/mumsnet-and-heartbleed-as-it-happened
Ward, Mark (29 April 2014). "Heartbleed used to uncover data from cyber-criminals". BBC News. Archived from the original on 14 May 2018. Retrieved 21 June 2018. https://www.bbc.com/news/technology-27203766
Lawler, Richard (11 April 2014). "Cloudflare Challenge proves 'worst case scenario' for Heartbleed is actually possible". Engadget. Archived from the original on 29 December 2017. Retrieved 29 August 2017. https://www.engadget.com/2014/04/11/heartbleed-openssl-cloudflare-challenge/
"The Heartbleed Challenge". CloudFlare. 2014. Archived from the original on 12 April 2014. https://web.archive.org/web/20140412234126/https://www.cloudflarechallenge.com/heartbleed
Robertson, Jordan (16 April 2014). "Hackers from China waste little time in exploiting Heartbleed". The Sydney Morning Herald. Archived from the original on 28 December 2017. Retrieved 16 April 2020. https://www.smh.com.au/it-pro/security-it/hackers-from-china-waste-little-time-in-exploiting-heartbleed-20140416-zqvkd.html
Frizell, Sam (20 August 2014). "Report: Devastating Heartbleed Flaw Was Used in Hospital Hack". Time. Archived from the original on 7 October 2014. Retrieved 7 October 2014. https://time.com/3148773/report-devastating-heartbleed-flaw-was-used-in-hospital-hack/
Cipriani, Jason (9 April 2014). "Heartbleed bug: Check which sites have been patched". CNET. Archived from the original on 17 April 2020. Retrieved 16 April 2020. https://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/
Gallagher, Sean (9 April 2014). "Heartbleed vulnerability may have been exploited months before patch". Ars Technica. Archived from the original on 3 March 2017. Retrieved 14 June 2017. https://arstechnica.com/security/2014/04/heartbleed-vulnerability-may-have-been-exploited-months-before-patch/
Eckersley, Peter (10 April 2014). "Wild at Heart: Were Intelligence Agencies Using Heartbleed in November 2013?". Eff.org. Archived from the original on 5 December 2014. Retrieved 25 November 2014. https://www.eff.org/deeplinks/2014/04/wild-heart-were-intelligence-agencies-using-heartbleed-november-2013
Graham, Robert (9 April 2014). "No, we weren't scanning for hearbleed before April 7". Errata Security. Archived from the original on 16 October 2017. Retrieved 10 April 2014. http://blog.erratasec.com/2014/04/no-we-werent-scanning-for-hearbleed.html
Riley, Michael (12 April 2014). "NSA Said to Exploit Heartbleed Bug for Intelligence for Years". Bloomberg. Archived from the original on 11 April 2014. Retrieved 7 March 2017. https://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html
Molina, Brett. "Report: NSA exploited Heartbleed for years". USA Today. Archived from the original on 11 April 2014. Retrieved 11 April 2014. https://www.usatoday.com/story/tech/2014/04/11/heartbleed-cisco-juniper/7589759/
Riley, Michael. "NSA exploited Heartbleed bug for two years to gather intelligence, sources say". Financial Post. Archived from the original on 11 April 2014. Retrieved 11 April 2014. http://business.financialpost.com/2014/04/11/nsa-exploited-heartbleed-bug-for-two-years-to-gather-intelligence-sources-say/
"Statement on Bloomberg News story that NSA knew about the 'Heartbleed bug' flaw and regularly used it to gather critical intelligence". National Security Agency. 11 April 2014. Archived from the original on 27 December 2017. Retrieved 13 April 2014. https://icontherecord.tumblr.com/post/82416436703/statement-on-bloomberg-news-story-that-nsa-knew
Hosenball, Mark; Dunham, Will (11 April 2014). "White House, spy agencies deny NSA exploited 'Heartbleed' bug". Reuters. Archived from the original on 15 April 2014. Retrieved 1 July 2017. https://www.reuters.com/article/us-cybersecurity-internet-bug-nsa-idUSBREA3A1XD20140411
Zetter, Kim. "U.S. Gov Insists It Doesn't Stockpile Zero-Day Exploits to Hack Enemies". Wired. wired.com. Archived from the original on 29 November 2014. Retrieved 25 November 2014. https://www.wired.com/2014/11/michael-daniel-no-zero-day-stockpile/
Hunt, Troy (9 April 2014). "Everything you need to know about the Heartbleed SSL bug". Troyhunt. Archived from the original on 11 April 2014. Retrieved 11 April 2014. https://www.troyhunt.com/2014/04/everything-you-need-to-know-about.html
"git.openssl.org Git – openssl.git/log". git.openssl.org. Archived from the original on 15 April 2014. Retrieved 25 November 2014. https://web.archive.org/web/20140415193656/https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dlog%3Bh%3Drefs%2Ftags%2FOpenSSL_1_0_1g
"Spiceworks Community Discussions". community.spiceworks.com. Archived from the original on 15 April 2014. Retrieved 11 April 2014. http://community.spiceworks.com/topic/474704-cyberoam-users-need-not-bleed-over-heartbleed-exploit
"OpenSSL Security Advisory [07 Apr 2014]". The OpenSSL Project. 7 April 2014. Archived from the original on 8 April 2014. Retrieved 9 April 2014. https://www.openssl.org/news/secadv_20140407.txt
"OpenSSL versions and vulnerability [9 April 2014]". Comodo. Archived from the original on 5 July 2014. Retrieved 9 April 2014. https://web.archive.org/web/20140705212748/https://blogs.comodo.com/e-commerce/heartbleed-bug-comodo-urges-openssl-users-to-apply-patch/
"Cyberoam Users Need not Bleed over Heartbleed Exploit". cyberoam.com. Archived from the original on 15 April 2014. Retrieved 11 April 2014. https://web.archive.org/web/20140415030425/http://www.cyberoam.com/blog/cyberoam-users-need-not-bleed-over-heartbleed-exploit/
"tls1_process_heartbeat [9 April 2014]". Archived from the original on 26 August 2014. Retrieved 10 April 2014. http://openssl.6102.n7.nabble.com/tls1-process-heartbeat-dtls1-process-heartbeat-don-t-check-RAND-pseudo-bytes-return-value-td49256.html
"Why Heartbleed is dangerous? Exploiting CVE-2014-0160". IPSec.pl. 2014. Archived from the original on 8 April 2014. Retrieved 9 April 2014. https://web.archive.org/web/20140408224556/http://ipsec.pl/ssl-tls/2014/why-heartbleed-dangerous-exploiting-cve-2014-0160.html
"Heartbleed Bug". 11 October 2023. Archived from the original on 7 April 2014. Retrieved 9 April 2014. http://heartbleed.com/
Graham-Cumming, John (28 April 2014). "Searching for The Prime Suspect: How Heartbleed Leaked Private Keys". CloudFlare. Archived from the original on 29 December 2017. Retrieved 7 June 2014. https://blog.cloudflare.com/searching-for-the-prime-suspect-how-heartbleed-leaked-private-keys
Judge, Kevin. "Servers Vulnerable to Heartbleed [14 July 2014]". Archived from the original on 26 August 2014. Retrieved 25 August 2014. https://web.archive.org/web/20140826133742/https://blogs.comodo.com/e-commerce/many-servers-vulnerable-heartbleed-act-now/
Rainie, Lee; Duggan, Maeve (30 April 2014). "Heartbleed's Impact". Pew Research Internet Project. Pew Research Center. p. 2. Archived from the original on 28 December 2017. Retrieved 22 May 2014. http://www.pewinternet.org/2014/04/30/heartbleeds-impact/2/#main-findings
Bradley, Tony (14 April 2014). "Reverse Heartbleed puts your PC and devices at risk of OpenSSL attack". PC World. IDG Consumer & SMB. Archived from the original on 2 December 2016. Retrieved 10 May 2014. http://www.pcworld.com/article/2142808/reverse-heartbleed-puts-your-pc-and-the-internet-of-things-at-risk.html
Arthur, Charles (15 April 2014). "Heartbleed makes 50m Android phones vulnerable, data shows". The Guardian. Guardian News and Media Limited. Archived from the original on 19 March 2016. Retrieved 14 December 2016. https://www.theguardian.com/technology/2014/apr/15/heartbleed-android-phones-vulnerable-data-shows
"Security Now 451". Twit.Tv. Archived from the original on 19 April 2014. Retrieved 19 April 2014. http://twit.tv/show/security-now/451
Ramzan, Zulfikar (24 April 2014). "'Reverse Heartbleed' can attack PCs and mobile phones". SC Magazine. Haymarket Media, Inc. Archived from the original on 6 October 2016. Retrieved 10 May 2014. http://www.scmagazine.com/reverse-heartbleed-can-attack-pcs-and-mobile-phones/article/344108/
Arthur, Charles (15 April 2014). "Heartbleed makes 50m Android phones vulnerable, data shows". The Guardian. Guardian News and Media Limited. Archived from the original on 19 March 2016. Retrieved 14 December 2016. https://www.theguardian.com/technology/2014/apr/15/heartbleed-android-phones-vulnerable-data-shows
"OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products". Cisco Systems. 9 April 2014. Archived from the original on 29 December 2017. Retrieved 8 May 2014. http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed
"heartbleed-masstest: Overview". GitHub. Archived from the original on 1 June 2014. Retrieved 19 April 2014. https://github.com/musalbas/heartbleed-masstest#overview
Cipriani, Jason (10 April 2014). "Which sites have patched the Heartbleed bug?". CNET. Archived from the original on 11 April 2014. Retrieved 10 April 2014. https://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/
"Heartbleed FAQ: Akamai Systems Patched". Akamai Technologies. 8 April 2014. Archived from the original on 8 April 2014. Retrieved 9 April 2014. https://blogs.akamai.com/2014/04/heartbleed-faq-akamai-systems-patched.html
"AWS Services Updated to Address OpenSSL Vulnerability". Amazon Web Services. 8 April 2014. Archived from the original on 11 April 2014. Retrieved 9 April 2014. https://aws.amazon.com/security/security-bulletins/aws-services-updated-to-address-openssl-vulnerability/
"Dear readers, please change your Ars account passwords ASAP". Ars Technica. 8 April 2014. Archived from the original on 18 January 2017. Retrieved 14 June 2017. https://arstechnica.com/security/2014/04/dear-readers-please-change-your-ars-account-passwords-asap/
"All Heartbleed upgrades are now complete". BitBucket Blog. 9 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. https://blog.bitbucket.org/2014/04/09/all-heartbleed-upgrades-are-now-complete/
"Keeping Your BrandVerity Account Safe from the Heartbleed Bug". BrandVerity Blog. 9 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. http://blog.brandverity.com/2721/keeping-your-brandverity-account-safe-from-the-heartbleed-bug/
@freenodestaff (8 April 2014). "we've had to restart a bunch of servers due to an openssl security vulnerability, which is/was very noisy. So sorry!" (Tweet) – via Twitter. https://x.com/freenodestaff/status/453470038704795648
"Security: Heartbleed vulnerability". GitHub. 8 April 2014. Archived from the original on 10 April 2014. Retrieved 9 April 2014. https://github.com/blog/1818-security-heartbleed-vulnerability
"IFTTT Says It Is 'No Longer Vulnerable' To Heartbleed". LifeHacker. 8 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. http://www.lifehacker.com.au/2014/04/ifttt-says-it-is-no-longer-vulnerable-to-heartbleed/
"Heartbleed bug and the Archive". Internet Archive Blogs. 9 April 2014. Retrieved 14 April 2014. https://blog.archive.org/2014/04/09/heartbleed-bug-and-the-archive/
@KrisJelbring (8 April 2014). "If you logged in to any of our games or websites in the last 24 hours using your username+password I'd recommend you to change your password" (Tweet). Retrieved 14 April 2014 – via Twitter. https://x.com/KrisJelbring/status/453559871028613121
Kelion, Leo (14 April 2014). "Heartbleed hacks hit Mumsnet and Canada's tax agency". BBC News. Archived from the original on 29 November 2017. Retrieved 21 June 2018. https://www.bbc.co.uk/news/technology-27028101
"The widespread OpenSSL 'Heartbleed' bug is patched in PeerJ". PeerJ. 9 April 2014. Archived from the original on 13 April 2014. Retrieved 9 April 2014. http://blog.peerj.com/post/82185230692/the-widespread-openssl-heartbleed-bug-is-patched-in
"Was Pinterest impacted by the Heartbleed issue?". Pinterest Help Center. Archived from the original on 21 April 2014. Retrieved 20 April 2014. https://web.archive.org/web/20140421081941/http://help.pinterest.com/en/articles/was-pinterest-impacted-heartbleed-issue
"Heartbleed Defeated". Prezi. Archived from the original on 5 June 2014. Retrieved 13 April 2014. https://web.archive.org/web/20140605054513/http://engineering.prezi.com/blog/2014/04/12/heartbleed/
"We recommend that you change your reddit password". Reddit. 14 April 2014. Archived from the original on 15 April 2014. Retrieved 14 April 2014. https://www.reddit.com/r/announcements/comments/231hl7/we_recommend_that_you_change_your_reddit_password
"IMPORTANT ANNOUNCEMENTS FROM THE MAKERS OF CHILI". Archived from the original on 28 July 2013. Retrieved 13 April 2014. http://forums.somethingawful.com/announcement.php?forumid=1
Codey, Brendan (9 April 2014). "Security Update: We're going to sign out everyone today, here's why". SoundCloud. Archived from the original on 13 April 2014. Retrieved 9 April 2014. https://blog.soundcloud.com/2014/04/09/heartbleed/
"SourceForge response to Heartbleed". SourceForge. 10 April 2014. Archived from the original on 11 April 2014. Retrieved 10 April 2014. https://sourceforge.net/blog/sourceforge-response-to-heartbleed/
"Heartbleed". SparkFun. 9 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. https://www.sparkfun.com/news/1455
"Heartbleed". Stripe (company). 9 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. https://stripe.com/blog/heartbleed
"Tumblr Staff-Urgent security update". 8 April 2014. Archived from the original on 9 April 2014. Retrieved 9 April 2014. https://staff.tumblr.com/post/82113034874/urgent-security-update
Hern, Alex (9 April 2014). "Heartbleed: don't rush to update passwords, security experts warn". The Guardian. Archived from the original on 3 January 2017. Retrieved 14 December 2016. https://www.theguardian.com/technology/2014/apr/09/heartbleed-dont-rush-to-update-passwords-security-experts-warn
Grossmeier, Greg (8 April 2014). "[Wikitech-l] Fwd: Security precaution – Resetting all user sessions today". Wikimedia Foundation. Archived from the original on 18 June 2014. Retrieved 9 April 2014. https://lists.wikimedia.org/pipermail/wikitech-l/2014-April/075801.html
Grossmeier, Greg (10 April 2014). "Wikimedia's response to the "Heartbleed" security vulnerability". Wikimedia Foundation blog. Archived from the original on 13 April 2014. Retrieved 10 April 2014. https://blog.wikimedia.org/2014/04/10/wikimedias-response-to-the-heartbleed-security-vulnerability/
"Wunderlist & the Heartbleed OpenSSL Vulnerability". 10 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. https://web.archive.org/web/20140413125107/http://support.wunderlist.com/customer/portal/articles/1508382-sync-service-heartbleed---8th-of-april-2014
"Security concerns prompts tax agency to shut down website". CTV News. 9 April 2014. Archived from the original on 18 January 2021. Retrieved 9 April 2014. http://www.ctvnews.ca/canada/security-concerns-prompts-tax-agency-to-shut-down-website-1.1767727
"Heartbleed: Canadian tax services back online". CBC News. Archived from the original on 25 April 2018. Retrieved 14 April 2014. http://www.cbc.ca/news/business/heartbleed-canadian-tax-services-back-online-1.2608781
Ogrodnik, Irene (14 April 2014). "900 SINs stolen due to Heartbleed bug: Canada Revenue Agency | Globalnews.ca". globalnews.ca. Global News. Archived from the original on 4 May 2019. Retrieved 4 May 2019. https://globalnews.ca/news/1269168/900-sin-numbers-stolen-due-to-heartbleed-bug-canada-revenue-agency/
Seglins, Dave (3 December 2014). "CRA Heartbleed hack: Stephen Solis-Reyes facing more charges". cbc.ca. CBC News. Archived from the original on 4 May 2019. Retrieved 4 May 2019. https://www.cbc.ca/news/canada/cra-heartbleed-hack-stephen-solis-reyes-facing-more-charges-1.2859416
"The Statistics Canada Site Was Hacked By an Unknown Attacker". Vice – Motherboard. Archived from the original on 24 December 2018. Retrieved 23 December 2018. https://motherboard.vice.com/en_us/article/kbygza/statistics-canada-revenue-agency-hacked
Grossmeier, Greg (8 April 2014). "[Wikitech-l] Fwd: Security precaution – Resetting all user sessions today". Wikimedia Foundation. Archived from the original on 18 June 2014. Retrieved 9 April 2014. https://lists.wikimedia.org/pipermail/wikitech-l/2014-April/075801.html
Fiegerman, Seth (14 April 2014). "The Heartbleed Effect: Password Services Are Having a Moment". Mashable. Archived from the original on 16 October 2017. Retrieved 28 April 2014. http://mashable.com/2014/04/14/heartbleed-password-management/
"LastPass and the Heartbleed Bug". LastPass. 8 April 2014. Archived from the original on 18 December 2017. Retrieved 28 April 2014. http://blog.lastpass.com/2014/04/lastpass-and-heartbleed-bug.html
"OpenSSL bug CVE-2014-0160". Tor Project. 7 April 2014. Archived from the original on 10 July 2017. Retrieved 9 April 2014. https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
"[tor-relays] Rejecting 380 vulnerable guard/exit keys". Lists.torproject.org. 16 April 2014. Archived from the original on 19 April 2014. Retrieved 19 April 2014. https://lists.torproject.org/pipermail/tor-relays/2014-April/004336.html
"Tor Weekly News—April 16th, 2014 | The Tor Blog". Blog.torproject.org. Archived from the original on 19 April 2014. Retrieved 19 April 2014. https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-april-16th-2014
Gallagher, Sean (17 May 2012). "Tor network's ranks of relay servers cut because of Heartbleed bug". Ars Technica. Archived from the original on 1 May 2014. Retrieved 19 April 2014. https://arstechnica.com/security/2014/04/tor-networks-ranks-of-relay-servers-cut-because-of-heartbleed-bug/
Mimoso, Michael (17 April 2014). "Tor Blacklisting Exit Nodes Vulnerable to Heartbleed Bug | Threatpost | The first stop for security news". Threatpost. Archived from the original on 19 April 2014. Retrieved 19 April 2014. http://threatpost.com/tor-begins-blacklisting-exit-nodes-vulnerable-to-heartbleed/105519
Younger, Paul (11 April 2014). "PC game services affected by Heartbleed and actions you need to take". IncGamers. Archived from the original on 15 April 2014. Retrieved 15 April 2014. http://www.incgamers.com/2014/04/pc-game-services-affected-by-heartbleed-and-actions-you-need-to-take
"HP Servers Communication: OpenSSL "HeartBleed" Vulnerability". 18 April 2014. Archived from the original on 4 March 2016. https://web.archive.org/web/20160304030733/http://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04239413-1
"FileMaker products and the Heartbleed bug". 6 May 2014. Archived from the original on 12 October 2016. Retrieved 8 May 2014. http://help.filemaker.com/app/answers/detail/a_id/13384/~/filemaker-products-and-the-heartbleed-bug
italovignoli (10 April 2014). "LibreOffice 4.2.3 is now available for download". The Document Foundation. Archived from the original on 12 April 2014. Retrieved 11 April 2014. http://blog.documentfoundation.org/2014/04/10/libreoffice-4-2-3-is-now-available-for-download/
"CVE-2014-0160". LibreOffice. 7 April 2014. Archived from the original on 3 May 2014. Retrieved 2 May 2014. http://www.libreoffice.org/about-us/security/advisories/cve-2014-0160/
"LogMeIn and OpenSSL". LogMeIn. Archived from the original on 13 April 2014. Retrieved 10 April 2014. http://blog.logmein.com/products/openssl
"McAfee Security Bulletin – OpenSSL Heartbleed vulnerability patched in McAfee products". McAfee KnowledgeBase. 17 April 2014. Archived from the original on 16 April 2014. Retrieved 15 April 2014. https://kc.mcafee.com/corporate/index?page=content&id=SB10071
"OpenSSL Security Bug – Heartbleed / CVE-2014-0160". Archived from the original on 28 May 2014. Retrieved 12 May 2014. http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
"OpenSSL Security Bug – Heartbleed / CVE-2014-0160". Archived from the original on 28 May 2014. Retrieved 12 May 2014. http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
"OpenSSL Security Bug – Heartbleed / CVE-2014-0160". Archived from the original on 28 May 2014. Retrieved 12 May 2014. http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
"Recent Version History". WinSCP. 14 April 2014. Archived from the original on 27 April 2014. Retrieved 2 May 2014. http://winscp.net/eng/docs/history#5.5.3
"Response to OpenSSL security issue CVE-2014-0160/CVE-2014-0346 a.k.a: "Heartbleed"". VMware, Inc. Archived from the original on 16 April 2014. Retrieved 17 April 2014. http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2076225
"OpenSSL Security Bug – Heartbleed / CVE-2014-0160". Archived from the original on 28 May 2014. Retrieved 12 May 2014. http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
"DSA-2896-1 openssl—security update". The Debian Project. 7 April 2014. Archived from the original on 11 April 2014. Retrieved 17 April 2014. https://www.debian.org/security/2014/dsa-2896
"Ubuntu Security Notice USN-2165-1". Canonical, Ltd. 7 April 2014. Archived from the original on 13 April 2014. Retrieved 17 April 2014. http://www.ubuntu.com/usn/usn-2165-1/
"Important: openssl security update". Red Hat, Inc. 8 April 2014. Archived from the original on 18 April 2014. Retrieved 17 April 2014. http://rhn.redhat.com/errata/RHSA-2014-0376.html
"Karanbir Singh's posting to CentOS-announce". centos.org. 8 April 2014. Archived from the original on 14 April 2014. Retrieved 17 April 2014. http://lists.centos.org/pipermail/centos-announce/2014-April/020248.html
"OpenSSL Security Bug – Heartbleed / CVE-2014-0160". Archived from the original on 28 May 2014. Retrieved 12 May 2014. http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
"Amazon Linux AMI Security Advisory: ALAS-2014-320". Amazon Web Services, Inc. 7 April 2014. Archived from the original on 6 June 2014. Retrieved 17 April 2014. https://aws.amazon.com/amazon-linux-ami/security-bulletins/ALAS-2014-320/
"Android 4.1.1 devices vulnerable to Heartbleed bug, says Google". NDTV Convergence. 14 April 2014. Archived from the original on 20 April 2014. Retrieved 19 April 2014. http://gadgets.ndtv.com/internet/news/android-411-devices-vulnerable-to-heartbleed-bug-says-google-508262
"Around 50 million Android smartphones are still vulnerable to the Heartbleed Bug". Fox News. 17 April 2014. Archived from the original on 19 April 2014. Retrieved 19 April 2014. https://www.foxnews.com/tech/around-50-million-android-smartphones-are-still-vulnerable-to-the-heartbleed-bug/
"Heartbleed: Android 4.1.1 Jelly Bean could be seriously affected". BGR Media. 16 April 2014. Archived from the original on 9 March 2017. Retrieved 19 April 2014. http://bgr.com/2014/04/16/heartbleed-android-4-1-1-jelly-bean
Blaich, Andrew (8 April 2014). "Heartbleed Bug Impacts Mobile Devices". Bluebox. Archived from the original on 6 May 2014.
https://web.archive.org/web/20140506061224/https://bluebox.com/technical/heartbleed-bug-impacts-mobile-devices/
Snell, Jason (22 April 2014). "Apple releases Heartbleed fix for AirPort Base Stations". Macworld. Archived from the original on 25 April 2020. Retrieved 16 April 2020. https://www.macworld.com/article/2146391/apple-releases-heartbleed-fix-for-airport-base-stations.html
"OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products". Cisco Systems. 9 April 2014. Archived from the original on 29 December 2017. Retrieved 8 May 2014. http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed
Kleinman, Alexis (11 April 2014). "The Heartbleed Bug Goes Even Deeper Than We Realized – Here's What You Should Do". The Huffington Post. Archived from the original on 23 March 2019. Retrieved 16 April 2020. https://www.huffingtonpost.com/2014/04/11/heartbleed-routers_n_5132306.html
Yadron, Danny (10 April 2014). "Heartbleed Bug Found in Cisco Routers, Juniper Gear". Dow Jones & Company, Inc. https://www.wsj.com/news/articles/SB10001424052702303873604579493963847851346?mg=reno64-wsj&url=https://www.wsj.com/article/SB10001424052702303873604579493963847851346.html
Yadron, Danny (10 April 2014). "Heartbleed Bug Found in Cisco Routers, Juniper Gear". Dow Jones & Company, Inc. https://www.wsj.com/news/articles/SB10001424052702303873604579493963847851346?mg=reno64-wsj&url=https://www.wsj.com/article/SB10001424052702303873604579493963847851346.html
"2014-04 Out of Cycle Security Bulletin: Multiple products affected by OpenSSL "Heartbleed" issue (CVE-2014-0160)". Juniper Networks. 14 April 2014. Archived from the original on 16 April 2014. Retrieved 19 April 2014. http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10623
"OpenSSL "Heartbleed" Information Disclosure, ECDSA". Electric Sheep Fencing LLC. 8 April 2014. Archived from the original on 2 May 2014. Retrieved 2 May 2014. https://www.pfsense.org/security/advisories/pfSense-SA-14_04.openssl.asc
"OpenVPN affected by OpenSSL bug CVE-2014-016?". DD-WRT Forum. Archived from the original on 26 February 2017. Retrieved 26 February 2017. https://www.dd-wrt.com/phpBB2/viewtopic.php?t=260167
"Heartbleed Bug Issue". Western Digital. 10 April 2014. Archived from the original on 19 April 2014. https://web.archive.org/web/20140419030929/http://www.wdc.com/en/heartbleedupdate/
Brewster, Tom (16 April 2014). "Heartbleed: 95% of detection tools 'flawed', claim researchers". The Guardian. Guardian News and Media Limited. Archived from the original on 4 March 2016. Retrieved 14 December 2016. https://www.theguardian.com/technology/2014/apr/16/heartbleed-bug-detection-tools-flawed
"Tripwire SecureScan". Tripwire – Take Control of IT Security and Regulatory Compliance with Tripwire Software. Archived from the original on 16 April 2014. Retrieved 7 October 2014. http://www.tripwire.com/securescan/?home-banner/
"AppCheck – static binary scan, from Codenomicon". Archived from the original on 17 October 2014. Retrieved 7 October 2014. https://web.archive.org/web/20141017040324/http://appcheck.codenomicon.com/
"Arbor Network's Pravail Security Analytics". Archived from the original on 11 April 2014. Retrieved 7 October 2014. https://web.archive.org/web/20140411184046/http://www.arbornetworks.com/asert/2014/04/heartbleed/
"Norton Safeweb Heartbleed Check Tool". Archived from the original on 10 October 2014. Retrieved 7 October 2014. http://safeweb.norton.com/heartbleed
"Heartbleed OpenSSL extension testing tool, CVE-2014-0160". Possible.lv. Archived from the original on 11 April 2014. Retrieved 11 April 2014. http://possible.lv/tools/hb/
"Test your server for Heartbleed (CVE-2014-0160)". Archived from the original on 11 December 2017. Retrieved 25 November 2014. https://filippo.io/Heartbleed/
"Cyberoam Security Center". Archived from the original on 15 April 2014. Retrieved 25 November 2014. https://web.archive.org/web/20140415025606/http://csc.cyberoam.com/cyberoamsupport/webpages/webcat/2014-0160.jsp
"Critical Watch :: Heartbleed Tester :: CVE-2014-0160". Heartbleed.criticalwatch.com. Archived from the original on 14 April 2014. Retrieved 14 April 2014. https://web.archive.org/web/20140414020245/http://heartbleed.criticalwatch.com/
"metasploit-framework/openssl_heartbleed.rb at master". GitHub. Archived from the original on 28 June 2015. Retrieved 25 November 2014. https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb
"OpenSSL Heartbeat Vulnerability Check (Heartbleed Checker)". Archived from the original on 24 December 2014. Retrieved 25 November 2014. http://rehmann.co/projects/heartbeat/
"Heartbleed Detector: Check If Your Android OS Is Vulnerable with Our App". Lookout Mobile Security. 9 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. https://blog.lookout.com/blog/2014/04/09/heartbleed-detector/
"Heartbleed checker". LastPass. Archived from the original on 10 April 2014. Retrieved 11 April 2014. https://lastpass.com/heartbleed/
"OpenSSL Heartbleed vulnerability scanner :: Online Penetration Testing Tools | Ethical Hacking Tools". Pentest-tools.com. Archived from the original on 13 April 2014. Retrieved 11 April 2014. https://pentest-tools.com/vulnerability-scanning/openssl-heartbleed-scanner/
Stafford, Jared (14 April 2014). "heartbleed-poc.py". Red Hat, Inc. Archived from the original on 12 April 2014. Retrieved 11 April 2014. https://access.redhat.com/labs/heartbleed/heartbleed-poc.py
"Qualys's SSL Labs' SSL Server Test". Archived from the original on 7 October 2014. Retrieved 7 October 2014. https://www.ssllabs.com/ssltest/
"Chromebleed". Archived from the original on 18 October 2014. Retrieved 7 October 2014. https://chrome.google.com/webstore/detail/chromebleed/eeoekjnjgppnaegdjbcafdggilajhpic
"FoxBleed". Archived from the original on 12 October 2014. Retrieved 7 October 2014. https://web.archive.org/web/20141012183740/https://addons.mozilla.org/en-US/firefox/addon/foxbleed/
"SSL Diagnos". SourceForge. Archived from the original on 12 October 2014. Retrieved 7 October 2014. http://sourceforge.net/projects/ssldiagnos/
"CrowdStrike Heartbleed Scanner". 18 April 2014. Archived from the original on 11 October 2014. Retrieved 7 October 2014. http://www.crowdstrike.com/blog/new-community-tool-crowdstrike-heartbleed-scanner/
Lynn, Samara. "Routers, SMB Networking Equipment – Is Your Networking Device Affected by Heartbleed?". PCMag.com. Archived from the original on 24 April 2014. Retrieved 24 April 2014. https://www.pcmag.com/article2/0,2817,2456909,00.asp
"Netcraft Site Report". Archived from the original on 17 August 2014. Retrieved 7 October 2014. http://toolbar.netcraft.com/site_report
"Netcraft Extensions". Archived from the original on 11 October 2014. Retrieved 7 October 2014. http://toolbar.netcraft.com/
Mutton, Paul (24 June 2014). "Netcraft Releases Heartbleed Indicator For Chrome, Firefox and Opera". Netcraft. Archived from the original on 11 July 2014. Retrieved 24 June 2014. http://news.netcraft.com/archives/2014/04/17/netcraft-releases-heartbleed-indicator-for-chrome-firefox-and-opera.html
Mann, Jeffrey (9 April 2014). "Tenable Facilitates Detection of OpenSSL Vulnerability Using Nessus and Nessus Perimeter Service". Tenable Network Security. Archived from the original on 13 April 2014. Retrieved 11 April 2014. http://www.tenable.com/blog/tenable-facilitates-detection-of-openssl-vulnerability-using-nessus-and-nessus-perimeter
"Nmap 6.45 Informal Release". 12 April 2014. Archived from the original on 17 April 2014. Retrieved 23 April 2014. http://seclists.org/nmap-dev/2014/q2/64
"VRT: Heartbleed Memory Disclosure – Upgrade OpenSSL Now!". 8 April 2014. Archived from the original on 11 April 2014. Retrieved 11 April 2014. http://vrt-blog.snort.org/2014/04/heartbleed-memory-disclosure-upgrade.html
"Blogs | How to Detect a Prior Heartbleed Exploit". Riverbed. 9 April 2014. Archived from the original on 19 April 2014. Retrieved 19 April 2014. http://www.riverbed.com/blogs/Retroactively-detecting-a-prior-Heartbleed-exploitation-from-stored-packets-using-a-BPF-expression.html
"Patched Servers Remain Vulnerable to Heartbleed OpenSSL | Hayden James". Haydenjames.io. 10 April 2014. Archived from the original on 13 April 2014. Retrieved 10 April 2014. http://haydenjames.io/patched-servers-remain-vulnerable-heartbleed-openssl/
"Security Certificate Revocation Awareness – Specific Implementations". Gibson Research Corporation. Archived from the original on 12 May 2014. Retrieved 7 June 2014. https://www.grc.com/revocation/implementations.htm
Mutton, Paul (24 April 2014). "Certificate revocation: Why browsers remain affected by Heartbleed | Netcraft". www.netcraft.com. Retrieved 13 December 2024. https://www.netcraft.com/blog/certificate-revocation-why-browsers-remain-affected-by-heartbleed/
Kerner, Sean Michael (19 April 2014). "Heartbleed SSL Flaw's True Cost Will Take Time to Tally". eWeek. Archived from the original on 10 February 2020. Retrieved 24 April 2014. http://www.eweek.com/security/heartbleed-ssl-flaws-true-cost-will-take-time-to-tally.html
A. Wheeler, David (29 April 2014). "How to Prevent the next Heartbleed". Archived from the original on 2 February 2017. Retrieved 30 January 2017. https://www.dwheeler.com/essays/heartbleed.html
A. Wheeler, David (29 April 2014). "How to Prevent the next Heartbleed". Archived from the original on 2 February 2017. Retrieved 30 January 2017. https://www.dwheeler.com/essays/heartbleed.html
Merkel, Robert (11 April 2014). "How the Heartbleed bug reveals a flaw in online security". The Conversation. Archived from the original on 17 April 2014. Retrieved 21 April 2014. https://theconversation.com/how-the-heartbleed-bug-reveals-a-flaw-in-online-security-25536
"Re: FYA: http: heartbleed.com". Gmane. Archived from the original on 11 April 2014. Retrieved 11 April 2014. https://web.archive.org/web/20140411014301/http://article.gmane.org/gmane.os.openbsd.misc/211963
"Theo De Raadt's Small Rant On OpenSSL". Slashdot. Dice. 10 April 2014. Archived from the original on 24 April 2014. Retrieved 22 April 2014. http://it.slashdot.org/story/14/04/10/1343236/theo-de-raadts-small-rant-on-openssl
Kerner, Sean Michael (22 April 2014). "After Heartbleed, OpenSSL Is Forked Into LibreSSL". eWeek. TechnologyAdvice. Retrieved 19 January 2021. https://www.eweek.com/security/after-heartbleed-openssl-is-forked-into-libressl
Seltzer, Larry (21 April 2014). "OpenBSD forks, prunes, fixes OpenSSL". Zero Day. ZDNet. Archived from the original on 21 April 2014. Retrieved 21 April 2014. https://www.zdnet.com/article/openbsd-forks-prunes-fixes-openssl/
Timson, Lia (11 April 2014). "Who is Robin Seggelmann and did his Heartbleed break the internet?". The Sydney Morning Herald. Archived from the original on 19 October 2017. Retrieved 16 April 2020. https://www.smh.com.au/it-pro/security-it/who-is-robin-seggelmann-and-did-his-heartbleed-break-the-internet-20140411-zqtjj.html
Grubb, Ben (11 April 2014). "Man who introduced serious 'Heartbleed' security flaw denies he inserted it deliberately". The Sydney Morning Herald.[permanent dead link] https://www.smh.com/it-pro/security-it/man-who-introduced-serious-heartbleed-security-flaw-denies-he-inserted-it-deliberately-20140410-zqta1.html
Williams, Chris (11 April 2014). "OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts". The Register. Archived from the original on 19 September 2016. Retrieved 29 August 2017. https://www.theregister.co.uk/Print/2014/04/11/openssl_heartbleed_robin_seggelmann/
A. Wheeler, David (29 April 2014). "How to Prevent the next Heartbleed". Archived from the original on 2 February 2017. Retrieved 30 January 2017. https://www.dwheeler.com/essays/heartbleed.html
Smith, Gerry (10 April 2014). "How The Internet's Worst Nightmare Could Have Been Avoided". The Huffington Post. Archived from the original on 19 July 2017. Retrieved 16 April 2020. The bug revealed this week was buried inside 10 lines of code and would have been spotted in an audit, according to Laurie, who works on the security team at Google. https://www.huffingtonpost.com/2014/04/10/heartbleed-bug_n_5120457.html
Walsh, John (30 April 2014). "Free Can Make You Bleed". SSH Communications Security. Archived from the original on 2 December 2016. Retrieved 11 September 2016. https://web.archive.org/web/20161202163921/http://blog.ssh.com/free-can-make-you-bleed
Walsh, John (30 April 2014). "Free Can Make You Bleed". SSH Communications Security. Archived from the original on 2 December 2016. Retrieved 11 September 2016. https://web.archive.org/web/20161202163921/http://blog.ssh.com/free-can-make-you-bleed
A. Wheeler, David (29 April 2014). "How to Prevent the next Heartbleed". Archived from the original on 2 February 2017. Retrieved 30 January 2017. https://www.dwheeler.com/essays/heartbleed.html
Pagliery, Jose (18 April 2014). "Your Internet security relies on a few volunteers". CNNMoney. Cable News Network. Archived from the original on 7 August 2020. Retrieved 3 August 2020. https://money.cnn.com/2014/04/18/technology/security/heartbleed-volunteers/
Perlroth, Nicole (18 April 2014). "Heartbleed Highlights a Contradiction in the Web". The New York Times. Archived from the original on 8 May 2014. Retrieved 27 February 2017. https://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html?_r=0
"Heartbleed Bug". 11 October 2023. Archived from the original on 7 April 2014. Retrieved 9 April 2014. http://heartbleed.com/
Kaminsky, Dan (10 April 2014). "Be Still My Breaking Heart". Dan Kaminsky's Blog. Archived from the original on 14 April 2014. Retrieved 22 April 2014. http://dankaminsky.com/2014/04/10/heartbleed/
Perlroth, Nicole (18 April 2014). "Heartbleed Highlights a Contradiction in the Web". The New York Times. Archived from the original on 8 May 2014. Retrieved 27 February 2017. https://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html?_r=0
Perlroth, Nicole (18 April 2014). "Heartbleed Highlights a Contradiction in the Web". The New York Times. Archived from the original on 8 May 2014. Retrieved 27 February 2017. https://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html?_r=0
"Here's another way exposing Heartbleed made the Internet more secure". The Daily Dot. 10 April 2014. Retrieved 25 January 2022. https://www.dailydot.com/unclick/heartbleed-neel-mehta-freedom-press-foundation-encryption/
Chiusano, Paul (8 December 2014). "The failed economics of our software commons, and what you can about it right now". Paul Chiusano's blog. Archived from the original on 6 April 2017. Retrieved 3 November 2017. https://pchiusano.github.io/2014-12-08/failed-software-economics
"Amazon Web Services, Cisco, Dell, Facebook, Fujitsu, Google, IBM, Intel, Microsoft, NetApp, Rackspace, VMware and The Linux Foundation Form New Initiative to Support Critical Open Source Projects". The Linux Foundation. 24 April 2014. Archived from the original on 25 April 2014. Retrieved 25 April 2014. http://www.linuxfoundation.org/news-media/announcements/2014/04/amazon-web-services-cisco-dell-facebook-fujitsu-google-ibm-intel
Paul, Ian (24 April 2014). "In Heartbleed's wake, tech titans launch fund for crucial open-source projects". PC World. Archived from the original on 25 April 2014. Retrieved 24 April 2014. http://www.pcworld.com/article/2147014/after-heartbleed-tech-giants-commit-to-supporting-critical-open-source-projects.html
"Amazon Web Services, Cisco, Dell, Facebook, Fujitsu, Google, IBM, Intel, Microsoft, NetApp, Rackspace, VMware and The Linux Foundation Form New Initiative to Support Critical Open Source Projects". The Linux Foundation. 24 April 2014. Archived from the original on 25 April 2014. Retrieved 25 April 2014. http://www.linuxfoundation.org/news-media/announcements/2014/04/amazon-web-services-cisco-dell-facebook-fujitsu-google-ibm-intel
"Google Project Zero aims to keep the Heartbleed Bug from happening again". TechRadar. 15 July 2014. Archived from the original on 10 April 2017. Retrieved 9 April 2017. http://www.techradar.com/news/internet/web/google-project-zero-aims-to-stop-the-heartbleed-bug-from-happening-again-1257434
Greenberg, Andy (15 July 2014). "Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers". Wired. ISSN 1059-1028. Retrieved 6 March 2019. https://www.wired.com/2014/07/google-project-zero/