Make no mistake about it. The OpenSSL repaired this with the release of OpenSSL 1.01g on April 7.is as serious for Internet security as a stage four cancer diagnosis would be for you. Worse still, OpenSSL 1.01 — the one production version affected — had been shipping since March 12, 2012. That meant tens of millions of Web sites had been potentially vulnerable to attacks via this hole. Fortunately,
How bad is this bug? as many as two-thirds of all "secured" Web sites are vulnerable to Heartbleed.Since OpenSSL is the default secure-socket layer/Transport Layer Security (SSL/TLS) for the Apache and NGINX Web servers, some estimates claim that
Worse still, proof-of-concept scripts are now available for script-kiddies to try to attack secure Web sites. Is your Website vulnerable to such assault? You can check your site with the Heartbleed test.
The good news is that operating system companies are now delivering the OpenSSL patches to their clients. So far, the fixed Linux operating systems include: CentOS, Debian, Fedora, Red Hat, openSUSE, and Ubuntu; SUSE Linux Enterprise Server (SLES) was not affected.
If you are in any doubt about your servers' security, check it for the bug and update it as soon as possible with the appropriate patch. This is no time to fool around with your security. Your systems, users, and customers' security all depend upon fixing this problem as quickly as possible.