If you’re running a Centos server or cPanel WHM and want to see if your server’s OpenSSL version is affected by Heartbleed you can do a few things. Here are three ways to check
##Check your OpenSSL version via the command line
run this:
openssl version
It should result in something like this:
OpenSSL 1.0.1e-fips 11 Feb 2013
While `1.0.1e` is listed as being vulnerable, your system may have already had a patch installed to fix that version, so to check for that patch run:
rpm -q –changelog openssl-1.0.1e | grep -B 1 CVE-2014-0160
If the patch has been applied you should get a result like this:
* Mon Apr 07 2014 Tomáš Mráz
– fix CVE-2014-0160 – information disclosure in TLS heartbeat extension
##Check for Heartbleed using this website
[http://filippo.io/Heartbleed/](http://filippo.io/Heartbleed/)
##Build the Heartbleed command line checker tool ( requires golang )
[https://github.com/FiloSottile/Heartbleed](https://github.com/FiloSottile/Heartbleed)