On 16/04/14 15:37, Chris Green wrote:
[SNIP]
So the hacker would simply 'ask' any old system (by sending an SSL packet or sequence of packets) for the contents of its RAM - oooh! I can see that would open up rather more vulnerabilities than just the odd username/login.
AIUI, the rogue request is not the designated length, but short. The responding server always replies with 64K, and it pads the response with random chunks of RAM. These can be examined, and it is possible to extract username and password information from it.
Therefore, it is pretty pointless rushing off to changes ones passwords until the server has been patched, or the new password can be sniffed out in just the same way as the old one could.
Cheers, Laurie.