Skip to main contentSkip to navigationSkip to navigation
Tools designed to tackle high-profile Heartbleed bug have their own problematic bugs.
Tools designed to tackle high-profile Heartbleed bug have their own problematic bugs. Photograph: Pawel Kopczynski/Reuters Photograph: PAWEL KOPCZYNSKI/REUTERS
Tools designed to tackle high-profile Heartbleed bug have their own problematic bugs. Photograph: Pawel Kopczynski/Reuters Photograph: PAWEL KOPCZYNSKI/REUTERS

Heartbleed: 95% of detection tools 'flawed', claim researchers

This article is more than 10 years old

Free web tools and not picking up the vulnerability, leaving consumer data exposed

Some tools designed to detect the Heartbleed vulnerability are flawed and won't detect the problem on affected websites, a cybersecurity consultancy has warned.

The Heartbleed flaw, which undermined the common security software for internet connections called OpenSSL, caused mass panic last week due to the ease with which it could be exploited to acquire passwords or encryption keys, potentially leaking sensitive personal data from popular consumer websites.

A deluge of tools then hit the internet promising to help people determine whether the web services they were using or hosting were affected. But 95% of the most popular ones are not reliable, according to London-based security consultancy and penetration testing firm Hut3.

'Absolute panic'

“A lot of companies out there will be saying they've run the free web tool and they're fine, when they're not,” Hut3’s Edd Hardy told the Guardian. “There's absolute panic. We're getting calls late at night going 'can you test everything'.”

Most of the tools checked by Hut3 rely on code designed to highlight the flaw created by developer Jared Stafford, which itself contained problematic bugs, said Hut3 penetration tester Adrian Hayter. These included tools created by major tech companies such as Intel-owned security firm McAfee and password management provider LastPass.

Hayter uncovered three problems with the Heartbleed checkers, which could lead to many cases of sites remaining vulnerable. One of the issues was to do with compatibility with different versions of SSL, the Secure Sockets Layer kind of web encryption affected by the Heartbleed flaw.

"The Heartbleed Checker is designed to work with common system configurations found in the wild," said Raj Samani, CTO for Europe, the middle east and Asia at McAfee. "There have been reports of detection failure rates of around 2.8% due to these configurations. We were aware of the possibility and have provided a disclosure directly above our checker. We are continually reviewing and revising our code and technique."

Joe Siegrist, CEO at LastPass, said: "Unlike all other tests, LastPass is not actually attempting to exploit the bug to test if it's currently present – we've been unsure if that's legal for a US entity to do.

"Our focus has been in ensuring people are updating/revoking their certificates, and that we're reflecting what major organisations are saying about their exposure. Can you update or make a new certificate and keep the heartbleed bug in place? Sure, but that's what all the other tests are for."

Widespread consequences

"It is yet another symptom of the 'hit the ground running' approach that has characterised the response to this vulnerability," said Rik Ferguson, vice president of security research at Trend Micro.

"The consequences are so widespread and the technology involved so arcane or invisible to the average user, that knee-jerk reactions and well-meaning advice have been offered up with little planning. From the initial Tumblr blog advising user to change all passwords everywhere 'now', before most of the vulnerable services would have been patched, to self-confessed 'quick and dirty' demonstration tools being incorporated into complete vulnerability scanning tools."

"The key to success with protection and mitigation of Heartbleed is more haste, less speed - otherwise you may well be sitting in the comfortable haze of a false sense of security. Ignorance isn’t bliss, it’s dangerous."

There are various versions of SSL and servers hosting websites can support some or all of them. If the server doesn't support the version that the user machine selects, then it will respond by either dropping the connection or trying to use a different type of SSL which the server does support.


Heartbleed: routers and phones also at risk
Developer who introduced Heartbleed error regrets 'oversight'
US government denies being aware of Heartbleed bug


Herein lies the problem with the detection tools: in many of them, only one version, known as TLSv1.1, is checked. If the server being tested for Heartbleed doesn't support TLSv1.1, it will either reject the connection or suggest another version. But the failed detectors do not check for another version and assume any server that does not provide a successful response is not vulnerable, said Hayter.

Similar problems lie in compatibility with “cipher suites”, the selections of algorithms used to set up a secure connection over the internet. “Once again, if the server does not support any of the cipher suites that the client sends, the connection will disconnect,” said Hayter.

Most of the tools he examined only told the server they supported about 51 cipher suites, when there are at least 318 cipher suites that could be used by a website. “Granted, most servers will support at least one of the ciphers in the list of 51, but there could be instances where a server does not support any of them, and in these cases, the server would respond with an error, which the scripts interpret as ‘not vulnerable’.”

The third bug was more simplistic: it meant that on slow internet connections some tools would stop working when processing the response of the server, as they would have a time limit. This would again interpret a server as not vulnerable, even if the partially downloaded response would have been enough to confirm the vulnerability, Hayter added.

Given the panic around Heartbleed, with many prematurely being told to change passwords for all web services, even before those sites had been fixed, the latest findings will do nothing to appease the confusion. Hut3 has created its own tool which it believes could help alleviate some of the pain.

Comments (…)

Sign in or create your Guardian account to join the discussion

Most viewed

Most viewed