- Joined
- Jul 22, 2005
- Location
- New York, NY, United States
This website is not affected by the exploit in any way.
Further information:
Last night news about a remote OpenSSL bug was disclosed on http://heartbleed.com/ which detailed out an exploit in the OpenSSL system library that handles HTTPS connections on your server. This bug impacts CentOS 6.x servers and any server with Litespeed prior to 4.2.9. A fix was issued by the CentOS maintainers which patched this issue last night. Litespeed has also patched this with version 4.2.9. All CentOS 6 servers that do not have any added third party yum repositories, along with cPanel/WHM updates turned on, should have auto updated over the course of last night and this morning. We are now pushing out the Litespeed upgrade to all affected customers. This means that your server should already be patched with the fix that prevents this issue moving forward. Our support team has been working hard today to ensure that all CentOS 6 servers have been updated with this patch.
Because WindowsForum.com does not actively use OpenSSL for any security-required data or password related transactions, we confirm no harm has been done by the "Heartbleed" exploit. However, 2/3rd of the Internet is currently in an emergency situation, since most online stores are using some form of SSL exploited here. We are not affected by the Heartbleed Internet disaster.
This guy simplifies exactly what is going on over the Internet:
For even further information: http://lmgtfy.com/?q=Heartbleed
http://filippo.io/Heartbleed/#windowsforum.com:443
Further information:
Last night news about a remote OpenSSL bug was disclosed on http://heartbleed.com/ which detailed out an exploit in the OpenSSL system library that handles HTTPS connections on your server. This bug impacts CentOS 6.x servers and any server with Litespeed prior to 4.2.9. A fix was issued by the CentOS maintainers which patched this issue last night. Litespeed has also patched this with version 4.2.9. All CentOS 6 servers that do not have any added third party yum repositories, along with cPanel/WHM updates turned on, should have auto updated over the course of last night and this morning. We are now pushing out the Litespeed upgrade to all affected customers. This means that your server should already be patched with the fix that prevents this issue moving forward. Our support team has been working hard today to ensure that all CentOS 6 servers have been updated with this patch.
Because WindowsForum.com does not actively use OpenSSL for any security-required data or password related transactions, we confirm no harm has been done by the "Heartbleed" exploit. However, 2/3rd of the Internet is currently in an emergency situation, since most online stores are using some form of SSL exploited here. We are not affected by the Heartbleed Internet disaster.
This guy simplifies exactly what is going on over the Internet:
For even further information: http://lmgtfy.com/?q=Heartbleed
http://filippo.io/Heartbleed/#windowsforum.com:443
Last edited: