cancel
Showing results for 
Search instead for 
Did you mean: 
Highlighted
Level 9
Report Inappropriate Content
Message 1 of 9

Heartbleed signature?

Jump to solution

Anyone have a signature for the heartbleed OpenSSL bug?  I am hoping McAfee will come up with something for it.

http://http://heartbleed.com/.com/

Can IDS/IPS detect or block this attack?

Although the content of the heartbeat request is encrypted it has its own record type in the protocol. This should allow intrusion detection and prevention systems (IDS/IPS) to be trained to detect use of the heartbeat request. Due to encryption differentiating between legitimate use and attack can not be based on the content of the request, but the attack may be detected by comparing the size of the request against the size of the reply. This seems to imply that IDS/IPS can be programmed to detect the attack but not to block it unless heartbeat requests are blocked altogether.

1 Solution

Accepted Solutions
Highlighted
Level 9
Report Inappropriate Content
Message 3 of 9

Re: Heartbleed signature?

Jump to solution

Looks like McAfee has released a UDS, good job guys.

SSL: OpenSSL TLS DTLS Heartbeat Extension Packets Info Disclosure

A Network Security Emergency User Defined Signature (UDS) has been created to detect this threat. The UDS is available for download via the Knowledge Base article KB55447.

View solution in original post

8 Replies

Re: Heartbleed signature?

Jump to solution

Fully support this request!

I've raised an SR 4-5613282937 regarding this

Highlighted
Level 9
Report Inappropriate Content
Message 3 of 9

Re: Heartbleed signature?

Jump to solution

Looks like McAfee has released a UDS, good job guys.

SSL: OpenSSL TLS DTLS Heartbeat Extension Packets Info Disclosure

A Network Security Emergency User Defined Signature (UDS) has been created to detect this threat. The UDS is available for download via the Knowledge Base article KB55447.

View solution in original post

Highlighted

Re: Heartbleed signature?

Jump to solution

When Mcafee relases a UDS, we imported as a custom signature..

But, what isn't clear, is do I ahve to go enable it in the policy, to block, before I push out the update to the sensors?

Or, does this UDS "auto-block" the attack, just by its presence as a custom signature?

Highlighted

Re: Heartbleed signature?

Jump to solution

There is now an announcement at the top of the main page here: https://community.mcafee.com/index.jspa

Highlighted
Level 9
Report Inappropriate Content
Message 6 of 9

Re: Heartbleed signature?

Jump to solution

Depending on how you have your policies setup (which rule sets they are using), the signature may or may not be automatically added to your policy.  To ensure it is in your policy, just open the policy editor and check for the presense of the UDS signature.  (Policy | Intrusion Prevention | IPS Policies)

You can then open the signature and set it to block or packet capture or whatever.  Settings for what a signature does is policy specific, not signature specific.

In our case I enabled the packet capture option because we have SSL decrption, so I would be able to see what the attacker was able to get from heartbeat, if anything.

4-9-2014 3-54-57 PM.jpg

Highlighted

Re: Heartbleed signature?

Jump to solution

Anyone has any evidence that the UDS for the Heartbleed provided by McAFee works ?.

It doesnt seem to show up in the Threat Analyzer.

Highlighted
Level 7
Report Inappropriate Content
Message 8 of 9

Re: Heartbleed signature?

Jump to solution

Whats can i see in the packet which trigger for "UD-SSL: OpenSSL TLS DTLS Heartbeat Extension Packets Information Disclosure" . The target servers are not vulnerable  but signature is matching for network traffic. When looking at the packet in wireshark it looks a normal SSL conenction.

what could be the difference between normal SSL conection Vs OpenSSL heartbeat extension.

is there any signature which can give  exploitation of the heartbeat than just information disclosure. Trying to minimize the false positive.

Thanks in Advance

Highlighted
Level 7
Report Inappropriate Content
Message 9 of 9

Re: Heartbleed signature?

Jump to solution

Quetsion:

In MVM , Manage -> FASL Scripts, I reviewed the "OpenSSL TLS DTLS Heartbeat Extension Packets Information Disclosure" and in "View Script" I found some statement as follows:

    

FASL.vulnID     = 16505;

FASL.attackType = ATTACK_NONINTRUSIVE;

FASL.os         = OS_ANY;

FASL.protocol   = PROTOCOL_TCP;

FASL.filters = [ 443, 465, 990, 993, 994, 995, 563, 636, 992, 3713, 5061, 6514, 10161, 10162 ];

Does "FASL.filters" mean this check will only checkTCP ports in the group of "443, 465, 990, 993, 994, 995, 563, 636, 992, 3713, 5061, 6514, 10161, 10162"?   Or this check will cheking based on the IPs specified in  MVM, Settings -> Services -> TCP Scanning?

Thanks.

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community