OpenSSL is an open source toolkit implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, and is used in many security products. The flaw in OpenSSL was announced on March 17 of last year. That same day, security updates were released by Unix vendors OpenBSD and FreeBSD and most Linux distributions, including Red Hat, SUSE, Slackware, Mandrake and Gentoo, among others.
While it touts the inclusion of OpenSSL as part of UnixWare’s “enhanced security services,” SCO didn’t address the denial of service issue until the release of UnixWare 7.1.4 on June 15, nearly three months later. No patches were issued for earlier versions of the software. Apparently not all UnixWare customers have upgraded to 7.1.4, leading to Thursday’s release of the belated patches for UnixWare 7.1.3 and 7.1.1.
The lapse didn’t present any widespread security threat due to the limited use of SCO’s software on secure sites. Our January Secure Server Survey found only 70 SSL-enabled sites running on SCO Unix. The availability of patches doesn’t always lead to prompt upgrades; indeed, SSL security vulnerabilities have previously remain unpatched for a long time after fixes were available.
The Netcraft Secure Server Survey provides detailed information about encrypted transactions and e-commerce, including the growth rate for SSL-enabled sites, and which operating systems, server software and certificates are most widely used on these sites.