MENU
    OpenSSL TLS heartbeat read overrun defect (Heartbleed)
    • 01 Apr 2024
    • 1 Minute to read
    • Dark
    • PDF

    OpenSSL TLS heartbeat read overrun defect (Heartbleed)

    • Dark
    • PDF

    Article summary

    Are Pharos products affected by the OpenSSL "Heartbleed" defect?


    The OpenSSL TLS heartbeat read overrun defect (CVE-2014-0160), termed "Heartbleed", specifically affects the OpenSSL 1.0.1 libraries.  The exploit targets web services via the TLS extension for heartbeat.

    https://www.openssl.org/news/secadv_20140407.txt

    Most Pharos products are based upon Microsoft libraries, not OpenSSL.  Pharos EDI and SignUp rely on Microsoft IIS.  MobilePrint relies upon .NET Web-API.  These systems use Microsoft SSL libraries, such as SChannel, not OpenSSL.

    http://blogs.technet.com/b/erezs_iis_blog/archive/2014/04/09/information-about-heartbleed-and-iis.aspx

    Not all supporting libraries are Microsoft.  Each Development team is evaluating their non-Microsoft libraries to confirm whether any Pharos products are affected.

    Thus far, Development has finished their review of the following products and concluded that they are not affected.

    • Uniprint - All versions

    • Blueprint - All versions

    • MobilePrint - All versions

    • Omega PSX - Firmware 1.1.4

    • Omega PS200 - Firmware 1.0.1

    • Omega PS60 - Firmware 1.1.4

    • Omega PS60B - Firmware 1.0.0

    We'll continue to post updates to this article as we continue evaluating all of our products.


    Was this article helpful?


    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.