Centos – 3 Ways to Check openSSL Version / Heartbleed vulnerability

If you’re running a Centos server or cPanel WHM and want to see if your server’s OpenSSL version is affected by Heartbleed you can do a few things. Here are three ways to check

##Check your OpenSSL version via the command line

run this:

openssl version

It should result in something like this:

OpenSSL 1.0.1e-fips 11 Feb 2013

While `1.0.1e` is listed as being vulnerable, your system may have already had a patch installed to fix that version, so to check for that patch run:

rpm -q –changelog openssl-1.0.1e | grep -B 1 CVE-2014-0160

If the patch has been applied you should get a result like this:

* Mon Apr 07 2014 Tomáš Mráz 1.0.1e-16.7
– fix CVE-2014-0160 – information disclosure in TLS heartbeat extension

##Check for Heartbleed using this website

[http://filippo.io/Heartbleed/](http://filippo.io/Heartbleed/)

##Build the Heartbleed command line checker tool ( requires golang )

[https://github.com/FiloSottile/Heartbleed](https://github.com/FiloSottile/Heartbleed)

Related Posts:

  • No Related Posts
This entry was posted in Server Administration. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *