
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users."
(from http://heartbleed.com/)
See if your website is vulnerable using: http://filippo.io/Heartbleed/
PoCs:
- GitHub repo for the http://filippo.io/Heartbleed/ test site (in Go)
- OpenSSL heartbeat PoC with STARTTLS support. (in Python)
References
- Reddit threads: Technology , Netsec
- Diagnosis of the OpenSSL Heartbleed Bug
- See list at the end of http://heartbleed.com/