The simplest example of how a client can be exploited is that through a web browser that contains the vulnerability. The attacker just needs to convince victims to access a malicious URL link to allow the server to attack reaching the access to the memory of your web browser. This makes the content before the risk of leaks, as the previous session cookies, the web page was viewed, data and user personal information can be divulged.Most popular sites not using OpenSSL, and the library network security services (NSS libraries) is no security vulnerability to Heartbleed can be exploited. However, many command line on the web client using OpenSSL (fake example command line wget and curl)-this is the flaw can be leverage.The attacker needs to trick the spoof the user access a malicious web page, that web page that can help them eliminate some risks. However, this is not always necessary. Try to imagine an online translation service in which they provide service automatically with URL link to a French site and this service will automatically move the content into English.Behind it, this service will retrieve the entire contents of the site using its own client. If you provide the URL to a malicious server, supporting client can be exploited and the attacker can obtain sensitive information, such as source code and the information accessible from the website translation
đang được dịch, vui lòng đợi..