View Single Post
Guest | Posts: n/a | Thanked: 0 times | Joined on
#6
Originally Posted by pycage View Post
Clients should be mostly safe from Heartbleed. Firefox, Opera, Chrome, Thunderbird, Internet Explorer don't use OpenSSL, and Apple's version of OpenSSL is not recent enough for it.
The problem is the server side with all those web and application servers, proxy servers, etc. all using OpenSSL.

It's the TLS heartbeat keep-alive code that is vulnerable. KeepassX does not fall into this category, fortunately.
I suggest looking into this vulnerability, clients may or may not be vulnerable, depending on how TLS handshake is being utilized.

For those interested, try this out
https://github.com/Lekensteyn/pacemaker
 

The Following 4 Users Say Thank You to For This Useful Post: