5 replies, 2 voices Last updated by Randall Blanchard 4 years, 4 months ago
Viewing 5 reply threads
  • Author
    Replies
    • #41166

      Randall Blanchard
      Participant
      @leftblank15

      I need to find-out the ENTIRE Mac “Terminal.app” command, for checking for the “Heartbleed”-vulnerability — it got “cut-off”, in one of your articles, so I couldn’t use what was in the article .

      Please supply it, because I appear to have outgoing-“long-buffer” problems, accessing, some websites !

    • #41180

      Komando Community
      Participant
      @KomandoCommunity

      The Heartbleed vulnerability affected websites hosted on servers running insecure versions of OpenSSL. This vulnerability was from several years ago and websites would have already updated and patched their software where applicable. The Mac operating system OS X was never affected directly. As such, I was not able to find the commands you were inquiring about either on our site or elsewhere.

      Do you happen to have the link to the article you mentioned? We can take a look to see what it was discussing and how to find the information that was “cut off”.

    • #41208

      Randall Blanchard
      Participant
      @leftblank15

      I just need the command-line, to check the version, of the possibly-offending, software .

    • #41209

      Randall Blanchard
      Participant
      @leftblank15

      How to Test & Fix Heart Bleed SSL Vulnerabilities?

    • #41211

      Komando Community
      Participant
      @KomandoCommunity

      @leftblank15

      To clarify, the Heartbleed vulnerability only affects web servers and services and does not affect clients (your personal computer, not being used as a server).

      If you are hosting your own website or web services, you can connect to your server and then use the command in the 3rd-party article you linked. This will check to see if your server is running an old version of OpenSSL. I show the full command needed is listed in that article.

      It should also be noted that, according to Apple, iOS and OSX web servers and other Apple web-based services were never affected by the Heartbleed vulnerability. Apple software never used the vulnerable version of OpenSSL that was affected.

    • #41305

      Randall Blanchard
      Participant
      @leftblank15

      It turns-out, in the link that I had mentioned, you can copy the WHOLE command-line command, even if you cannot SEE the whole command, on the webpage .

Viewing 5 reply threads

You must be a Komando Community member to reply to this post. Sign up or log in.