Related HeartBleed Server Test it is not complete if not equipped with the closure of the OpenSSL bug. OpenSSL bug with an infection of 'HeartBleed' are:
- OpenSSL 1.0.1 Vuln
- OpenSSL 1.0.1g is NOT vulnerable
- OpenSSL 1.0.0 NOT vulnerable
- OpenSSL 0.9.8 NOT vulnerable
it is better to check the version of OpenSSL installed on your server with the command openssl version after that make sure the version you are vulnerable or not.
Broadly speaking, for distributions - distributions available to the server along with its version of OpenSSL.
- Debian 6 (Squeeze): Not infected (Bundling old version of OpenSSL)
- Debian 7 (Wheezy): 1.0.1e-2 + deb7u6
- Debian testing (Jessie): 1.0.1g-1
- Debian unstable (Sid): 1.0.1g-1
__________________________________________________________________________________
- Ubuntu 10.04 LTS: Not Infected (Bundling old version OpenSSL)
- Ubuntu 12.04 LTS: 1.0.1-4ubuntu5.12
- Ubuntu 12.10: 1.0.1c-3ubuntu2.7
- Ubuntu 13.04: Not Supported , Update Recommended
- Ubuntu 13.10: 1.0.1e-3ubuntu1.2
__________________________________________________________________________________
- CentOS 5: Not Infected (Bundling Old Version OpenSSL)
- CentOS 6: openssl-1.0.1e-16.el6.5.7
__________________________________________________________________________________
- Fedora 17: Not Infected (Bundling Old Version OpenSSL)
- Fedora 19: openssl-1.0.1e-37.fc19.1
So to Fix Bugs on ubuntu heartbleed required OpenSSL OpenSSL related updates. By typing the command apt-get update and then perform the upgrade by typing the command apt-get dist-upgrade.
But if you just want to update the OpenSSL related course, then the command is typed apt-get install openssl-only-upgrade and apt-get install-only-upgrade libssl1.0.0
After OpenSSL and libssl updated properly, then you need to do is to reboot the server.
Well if the version of OpenSSL version OpenSSL 1.0.1-4 ubuntu. then you are already in a safe version
And Then Say Goodbye To HeartBleed :)