Earlier today, Logan, posted on the LUGM facebook group that he has created a online tool (still in beta) that would test if your server is vulnerable to yet another vulnerability that has been recently discovered in OpenSSL. This particular vulnerability is known as CVE-2014-0224.

For Internet users in general let's see what is a CVE. It's a short form for Common Vulnerabilities and Exposures. MITRE Corporation maintains a list of these vulnerabilities and they are tagged with CVE identifiers in the following format:

cve-explained

Mitre Corporation describes the vulnerability as follows:

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

A quick chat with Logan & he confirmed me that the current Injection Tester by NCC Group is not reliable. He tried to contact the author but to no avail. Finally, he decided to write a tool. He coded the back-end and S. Moonesamy (SM as we call him) wrote the front-end. SM also provided hosting for the tool, through his company Elandsys.

The SSL Injection Test is available here.

To note, this tool as various other Security Audit tools are not to be used for malicious ends. The tools are made available for security testing purposes. The authors can't be held responsible for unlawful, unethical or inappropriate use of the tools.

I tested a few websites which I've worked on, all good, while some other local websites not good at all.

Screenshot of the tool

ssl-injection-test

If you find your server as vulnerable & you require expertise to patch it, you may contact S. Moonesamy. He's a good old fellow who has been contributing in the industry & worked closely on the security aspects of Internet.

Logan has alerted Google, Yahoo, Youtube and Ebay.

I sent an email to CERT-MU (Mauritian National Computer Security Incident Response Team) notifying them of the same.

I should also highlight that OpenBSD developers including Logan, are currently fine-tuning LibreSSL (an OpenSSL fork) and many security fixes have been brought including CVE-2014-0224 being patched. Please support the good work of these fellows by donating to the project.

Note

This tool like several others available on Internet, gives you a first indication about your OpenSSL vulnerability status. They may however show up false positives at times. The tool is mostly suitable for a quick check by those who do not have access to the servers. As for sysadmins having access, they may check their OpenSSL version manually & compare with versions that are affected by this vulnerability.