5 replies, 2 voices Last updated by  leftblank15 1 week ago
  • Author
    Replies
  • #41166

    leftblank15
    Participant
    @leftblank15

    I need to find-out the ENTIRE Mac “Terminal.app” command, for checking for the “Heartbleed”-vulnerability — it got “cut-off”, in one of your articles, so I couldn’t use what was in the article .

    Please supply it, because I appear to have outgoing-“long-buffer” problems, accessing, some websites !

  • #41180

    Komando Community
    Participant
    @KomandoCommunity

    The Heartbleed vulnerability affected websites hosted on servers running insecure versions of OpenSSL. This vulnerability was from several years ago and websites would have already updated and patched their software where applicable. The Mac operating system OS X was never affected directly. As such, I was not able to find the commands you were inquiring about either on our site or elsewhere.

    Do you happen to have the link to the article you mentioned? We can take a look to see what it was discussing and how to find the information that was “cut off”.

  • #41208

    leftblank15
    Participant
    @leftblank15

    I just need the command-line, to check the version, of the possibly-offending, software .

  • #41209

    leftblank15
    Participant
    @leftblank15

    How to Test & Fix Heart Bleed SSL Vulnerabilities?

  • #41211

    Komando Community
    Participant
    @KomandoCommunity

    @leftblank15

    To clarify, the Heartbleed vulnerability only affects web servers and services and does not affect clients (your personal computer, not being used as a server).

    If you are hosting your own website or web services, you can connect to your server and then use the command in the 3rd-party article you linked. This will check to see if your server is running an old version of OpenSSL. I show the full command needed is listed in that article.

    It should also be noted that, according to Apple, iOS and OSX web servers and other Apple web-based services were never affected by the Heartbleed vulnerability. Apple software never used the vulnerable version of OpenSSL that was affected.

  • #41305

    leftblank15
    Participant
    @leftblank15

    It turns-out, in the link that I had mentioned, you can copy the WHOLE command-line command, even if you cannot SEE the whole command, on the webpage .

You must be a Pro member to reply to this post. Sign up or log in.