Heartbleed again??
-
Hello fellow Netgate community members,
I thought we took care of this exploit years ago, even within Polycom teleconference equipment, how was this being attempted again. I wonder if this is a false positive or a real exploit being attempted. I remember when I was still in the field this was an emergency fix everything now bug, and there is not many like that. A drop everything fix it, and patch it bug.
Has anyone else see this signature being detected again?
ET EXPLOIT Possible OpenSSL HeartBleed Large HeartBeat Response from Common SSL Port (Outbound from Client)
I am glad I have official Snort subscriber rules this would have made me have a bad day.
-
@JonathanLee I doubt it’s a false positive, but rather a bot that’s just trying to find an unpatched server by trying all IPs. It doesn’t mean it will work.