• Call Us : 1-323-486-1121

How to Fix Heartbleed Vulnerability on Unmanaged Servers

In this article, we will discuss the "Heartbleed" OpenSSL vulnerability, as well as how you can fix it on your unmanaged server.

 

About Heartbleed

Some open SSL libraries have a well-known and well-studied bug that got the name “Heartbleed”. There are three operating system templates provided below that may make your unmanaged server vulnerable:

·       CentOS 6.5

·       Debian 7 (Wheezy)

·       Ubuntu 12.04

To fix this vulnerability, you must update your server and restart any services that use the OpenSSL library. The most commonly affected services are web servers, SQL, and e-mail, though other services (such as Tor and OpenVPN) are also affected.

 

Fixing the vulnerability

Below we provide you guidelines for fixing the Heartbleed on operating system templates that are shown above.

 

CentOS 6.5

If you run an unmanaged server on this operating system, follow the steps below to get rid of the Heartbleed vulnerability:

·       Install the latest updates on the server.

·       Reboot the server or selectively restart any affected services:

§  Web servers:

To restart the Apache web server, type the following commands:

/etc/init.d/httpd stop

/etc/init.d/httpd start

To restart the Nginx web server, type the following commands:

/etc/init.d/nginx stop

/etc/init.d/nginx start

§  SQL Services:

To restart MySQL, type the following commands:

/etc/init.d/mysql stop

/etc/init.d/mysql start

To restart PostgreSQL, type the following commands:

/etc/init.d/pgsql stop

/etc/init.d/pgsql start

§  E-mail Services:

To restart Postfix, type the following commands:

/etc/init.d/postfix stop

/etc/init.d/postfix start

To restart Exim, type the following commands:

/etc/init.d/exim stop

/etc/init.d/exim start

·       Run the online test at http://filippo.io/Heartbleed to confirm that the server is no longer vulnerable.

 

Debian 7 and Ubuntu 12.04

In order to fix the HeartBleed vulnerability on Debian 7 (Wheezy) or Ubuntu 12.04 (Precise Pangolin), follow these steps:

·       Install the latest updates on the server. For detailed information about how to do this, please see this article.

·       Reboot the server or selectively restart any affected services:

§  Web servers:

       To restart the Apache web server, type the following commands:

service apache2 stop

service apache2 start

To restart the Nginx web server, type the following commands:

service nginx stop

service nginx start

§  SQL Services:

To restart MySQL, type the following commands:

service mysql stop

service mysql start

To restart PostgreSQL, type the following commands:

service postgresql stop

service postgresql start

§  E-mail Services:

To restart Postfix, type the following commands:

service postfix stop

service postfix start

To restart Exim, type the following commands:

service exim stop

service exim start

·       Run the online test at http://filippo.io/Heartbleed to confirm that the server is no longer vulnerable.

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

SSL Protection

SSL (Secure Sockets Layer) is a great way of securing a website, as it allows you to send the...

Securing an Unmanaged Website

Here we explain how you can protect an unmanaged server. There are a few steps to go through....

Securing a Hacked Website

In this article, you will find a guideline in which it is explained how you can get a hacked...

Why You Need to Back Up Your Website

Although today it is extremely easy to manage a website, some bad things still can happen and...

How to Secure Your Website's Software

In this article, we will talk about how you can protect all the software that you have on your...