Analysing Heartbleed vulnerability in OpenSSL

  • Unique Paper ID: 102323
  • PageNo: 1536-1541
  • Abstract:
  • Abstract–A OpenSSL versions 1.0.1 through 1.0.1f—introduced beginning in March 2012—had a serious memory handling flaw in their implementation of the TLS Heartbeat Extension. This extension helps maintain user Internet connections without the need for continuous data transfers. Attackers could exploit the bug to access an application’s memory, including sensitive data and private encryption keys. The latter could let them launch man-in-the middle attacks and decode intercepted communications. This has been introduced as the worst vulnerability in the modern internet. Existence of this vulnerability for two years without being discovered illustrates that a lot of important open source Internet software is not funded, developed, or reviewed carefully enough and the testing tools are not advanced enough to detect it.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{102323,
        author = {Shuchi B. Shah},
        title = { Analysing Heartbleed vulnerability in OpenSSL},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {1},
        number = {12},
        pages = {1536-1541},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=102323},
        abstract = {Abstract–A OpenSSL versions 1.0.1 through 1.0.1f—introduced beginning in March 2012—had a serious memory handling flaw in their implementation of the TLS Heartbeat Extension.
This extension helps maintain user Internet connections without the need for continuous data
transfers. Attackers could exploit the bug to access an application’s memory, including sensitive data and private encryption keys. The latter could let them launch man-in-the middle attacks and decode intercepted communications. This has been introduced as the worst vulnerability in the modern internet. Existence of this vulnerability for two years without being discovered illustrates that a lot of important open source Internet software is not funded,  developed, or reviewed carefully enough and the testing tools are not advanced enough to detect it.},
        keywords = {},
        month = {},
        }

Cite This Article

Shah, S. B. (). Analysing Heartbleed vulnerability in OpenSSL. International Journal of Innovative Research in Technology (IJIRT), 1(12), 1536–1541.

Related Articles