2014-04-10 11:40 AM
What is Heartbleed?
The Heartbleed OpenSSL vulnerability is a serious weakness in specific implementations of the OpenSSL software on servers, Virtual Private Networks and other applications. For full details on this vulnerability, please visit http://heartbleed.com
How can RSA find instances of Heartbleed?
RSA Security Analytics gives users the ability to identify servers vulnerable to the Heartbleed exploit, as well as detect attempts to exploit the service. This is a perfect example of the type of incident investigation and forensics that can be achieved utilizing full packet capture and RSA Security Analytics.
What rules and/or parsers have been created to help find Heartbleed?
Parsers that have been created to address Heartbleed are now available in RSA Live. These are available for all RSA Live subscription tiers. The specific parsers are “TLS” and “TLS_lua”. Users subscribed to either of these parsers will be automatically updated. For users that are not currently subscribing to either piece of content, they should disable the default TLS parser and subscribe to one of the two TLS parsers available on RSA Live. For customers running RSA NetWitness / RSA Security Analytics version 10.2 and below, use the Flex parser “TLS”. For those running versions 10.2 and above, use the LUA parser “TLS-lua”.
To detect vulnerable servers, look for instances of “openssl vulnerable to heartbleed” under the risk.informational meta-key. For detecting exploit attempts, look for “heartbleed data leak” under risk.warning meta-key.
Once detected how can Heartbleed be remediated?
To fully remediate this vulnerability, upgrade weak systems to the latest fixed version of OpenSSL and revoke old keys. Renew your SSL certificate, and if applicable, change passwords for sensitive accounts.
2014-04-10 12:15 PM
Well done to the team to get this update out so fast.
2014-04-10 12:33 PM
Important
Make sure to subscribe to the parsers on Live, as they will be updated as we find new methods of attack. If you are a Security Analytics for Logs customer, ensure that you are subscribed to the appropriate IDS / IPS log parsers, as they will be updated as vendors release new signature sto detect exploits against the Heartbleed vulnerability
2014-04-10 01:10 PM
for this parser to work do i need to be capturing full ssl sessions? or will it still work with getting the meta information and truncating the capture?
2014-04-10 01:24 PM
I don't believe so. Let me verify that.
2014-04-10 01:43 PM
How are you truncating the traffic- app rule or at tap?
2014-04-10 01:44 PM
app rule.
2014-04-10 01:49 PM
App rules are kind of a catch-22, in that app rules are based off meta collected by successfully parsing the session. So if you are truncating with an app rule, that implies that the session has already been parsed and the meta has already been registered.
I *believe* you should be good to go
2014-04-10 02:17 PM
thanks for the info, i got a hit on it so the parser is working
2014-04-10 02:30 PM
Awesome! I appreciate the feedback!