Abstract
Social, economic and cultural relations depend, increasingly, technologies and infrastructure of information and communication (cyberspace), making it necessary to articulate a national security system cybersecurity (Fojon, 2010). The vulnerabilities of information systems coupled with the diversity of exploit in the second quarter of 2014 left exposed for more than two years since its verification or heartbleed security hole present in the OpenSSL Bug (Gujrathi, 2014) library, which allowing reading some information in the RAM of the computer, enterprise-level scenarios of financial, electronic service providers and others, compromising information from millions of users. Until the date of rectification heartbleed, was considered the main mistake of the flaws that have suffered servers throughout history, without being more than a programming error, that little by little was solved by deploying patches and updates OpenSSL libraries to protocol. Unfortunately, in September 2014, the presence of a new vulnerability was determined Bash, the same that is based on the command line that runs on Linux and Mac OS platforms, referring to a simple process as the cutting and pasting of the code.
To demonstrate these vulnerabilities a virtual scenario arises. Thus the level of impact that has each of these issues will be determined, a comparison between them and indicate what would be the measures to take in case of such problems in these solutions.
References
Amour, L. S., & Petullo, W. M. (2015). Improving Application Security Through TLS-Library Redesign
Britos, D., Vargas, L., Arias, S., Giraudo, N., & Veneranda, G. (2013). Laboratorio Remoto Virtual para la Enseñanza de. Tercera Conferencia de Directores de Tecnología de Información y Comunicación en las Instituciones de Educación Superior: soluciones de Enseñanza y la Investigación. Cartagena de Indias.
Blacksun, S. (2014). BLACKSUN. Obtenido de HeartBleed Explained: https://support.blacksun.ca/index .php?/News/NewsItem/View/74/ blacksun-update--heartbleedexplained
Cve-2014-0160. (2015). common vulnerabilities and exposures. obtenido de https://cve.mitre.org/cgibin/ cvename.cgi?name=CVE- 2014-0160.
Cve-2014-6271. (2014). common vulnerabilities and exposures. obtenido de https://cve.mitre.org/cgibin/ cvename.cgi?name=cve- 2014-6271
Durumeric, Z., Kasten, J., Adrian, D., Halderman, J. A., Bailey, M., Li, F., ... & Paxson, V. (2014, November). The matter of Heartbleed. In Proceedings of the 2014 Conference on Internet Measurement Conference (pp. 475-488). ACM.
Fernández, V. (2012). Dolthink Tecnología e Inovación. Obtenido de Compras seguras en Internet: http://www.dolthink.com/compr as-seguras-internet.html
Fojón Chamorro, e., & sanz villalba, á. f. (2010). ciberseguridad en España: una propuesta para su gestión. ARI, 102, 2010.
Graham, R. (2014). Bash 'shellshock' bug is wormable. Obtenido de http://blog.erratasec.com/2014/0 9/bash-shellshock-bug-iswormable.
html#.VRhefuGRZoh Internet Engineering Task Force - IETF. (2012). Transport Layer Security (TLS) and Datagram Transport
Jawi, S. M., Ali, F. H. M., & Zulkipli, N. H. N. (2015). Nonintrusive SSL/TLS Proxy with JSON-Based Policy. In Information Science and Applications (pp. 431-438). Springer Berlin Heidelberg.
Nacional, c. c. (2012). guía avanzada nmap. Valencia
Netcraft. (2015). March 2015 Web Server Survey. Obtenido de http://news.netcraft.com/archives/2015/03/19/march-2015-web-server-survey.html#more-18769
Ramos, D. A., & Engler, D. (2015). Under-Constrained Symbolic Execution: Correctness Checking for Real Code. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association.
Saleem, S. (2015). Analysing the Resolution of Security Bugs in Software Maintenance (Doctoral dissertation, The Open University).
Servidio, j. s., & taylor, r. d. (2015). safe and sound: cybersecurity for community banks. journal of taxation & regulation of financial institutions,28(4).
ZNET. (2014). First attacks using'shellshock' Bash bug discovered
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright (c) 2019 Janeth Inés Mora Secaira, Juan Pablo Verrezueta Vásquez