Web Hosting Knowledge Base Web Hosting Knowledge Base
  • Home
Get Started
Web Hosting Knowledge Base Web Hosting Knowledge Base
Get Started
Web Hosting Knowledge Base Web Hosting Knowledge Base
  • Home
loading
  1. Home
  2. Security
  3. How to fix the Heartbleed vulnerability on unmanaged servers
Updated on June 22, 2024

Security

  • Folder icon closed Folder open iconWhat is KernelCare?
  • Folder icon closed Folder open iconHow to help prevent spam in cPanel
  • Folder icon closed Folder open iconHow To Prevent Outgoing Email From Being Marked As Spam
  • Folder icon closed Folder open iconHow To Secure Your WordPress Site
  • Folder icon closed Folder open iconAn introduction to SSL
  • Folder icon closed Folder open iconHow to install a third-party SSL certificate
  • Folder icon closed Folder open iconHow to install an Organization Verified SSL certificate
  • Folder icon closed Folder open iconHow to install a Domain Verified SSL certificate
  • Folder icon closed Folder open iconHow to renew an SSL certificate
  • Folder icon closed Folder open iconHow to redirect visitors to SSL connections
  • Folder icon closed Folder open iconHow to use www and non-www domains with an SSL certificate
  • Folder icon closed Folder open iconHow To Find SSL Certificate Fingerprints
  • Folder icon closed Folder open iconHow to generate a private key and CSR from the command line
  • Folder icon closed Folder open iconHow to fix mixing of secure and insecure content on a web page
  • Folder icon closed Folder open iconHow to install an SSL certificate site seal
  • Folder icon closed Folder open iconSSL certificates and Server Name Indication (SNI) support
  • Folder icon closed Folder open iconHow to determine the OpenSSL version
  • Folder icon closed Folder open iconHow to secure an unmanaged server with a Let's Encrypt SSL certificate
  • Folder icon closed Folder open iconDifferences between Let's Encrypt certificates and traditional CA-issued certificates
  • Folder icon closed Folder open iconHow to manage HTTP Strict Transport Security (HSTS) for your site
  • Folder icon closed Folder open iconHow to install a self-signed SSL certificate
  • Folder icon closed Folder open iconDifferences between a cPanel certificate and a traditional CA-issued certificate
  • Folder icon closed Folder open iconWhere are SSL certificates from DigiCert, Sectigo, and cPanel banned?
  • Folder icon closed Folder open iconWhere are Comodo SSL certificates banned?
  • Folder icon closed Folder open iconPerpetual Security information
  • Folder icon closed Folder open iconHow to secure an unmanaged server
  • Folder icon closed Folder open iconHow to repair and secure a hacked site
  • Folder icon closed Folder open iconHow to help prevent spam
  • Folder icon closed Folder open iconHow to create a strong password
  • Folder icon closed Folder open iconHow to install server updates
  • Folder icon closed Folder open iconHow to harden a server with fail2ban
  • Folder icon closed Folder open iconHow to fix the Heartbleed vulnerability on unmanaged servers
  • Folder icon closed Folder open iconUnderstanding software vulnerabilities and protecting your account
  • Folder icon closed Folder open iconHow to protect yourself from email phishing scam attempts
  • Folder icon closed Folder open iconHow to generate Google reCAPTCHA keys for site security
  • Folder icon closed Folder open iconTLS and cipher suites update for December 2019
  • Folder icon closed Folder open iconHow to request Google to review hacked sites and remove Deceptive Site Ahead’ warning
  • Folder icon closed Folder open iconWhat is email spoofing?
  • Folder icon closed Folder open iconMigrations and legacy e-mail client applications
  • Folder icon closed Folder open iconSecure Sockets Layer (SSL) information
    • SSL/TLS certificate validity periods
    • How to generate a purchased SSL certificate for an unmanaged hosting account

How to fix the Heartbleed vulnerability on unmanaged servers

Estimated reading: 3 minutes 159 views

This article discusses the “Heartbleed” OpenSSL vulnerability, and how to fix it on your unmanaged server.

The information in this article only applies to the products listed in the Article Details sidebar. You must have root access to the server to follow the procedures described below.Table of Contents

  • About “Heartbleed”
  • Fixing the vulnerability
  • CentOS 6.5
  • Debian 7 and Ubuntu 12.04
  • More Information

About “Heartbleed”

The well-publicized “Heartbleed” vulnerability is a bug in certain versions of the OpenSSL library. If your unmanaged server is running one of the following operating system templates, it may be vulnerable:

  • CentOS 6.5
  • Debian 7 (Wheezy)
  • Ubuntu 12.04

To fix this vulnerability, you must update your server and restart any services that use the OpenSSL library. The most commonly affected services are web servers, SQL, and e-mail, though other services (such as Tor and OpenVPN) are also affected.

If you have automatic updates enabled on your server, then it has likely already been patched. To run an online test and determine whether or not a particular server is vulnerable, please visit http://filippo.io/Heartbleed.

Fixing the vulnerability

If your server is running one of the affected operating system templates listed above, follow the appropriate procedures below.

CentOS 6.5

To fix the HeartBleed vulnerability on CentOS 6.5, follow these steps:

  1. Install the latest updates on the server. For detailed information about how to do this, please see this article.
  2. Reboot the server or selectively restart any affected services:
    Web servers:
    • To restart the Apache web server, type the following commands:Copy/etc/init.d/httpd stop /etc/init.d/httpd start
    • To restart the Nginx web server, type the following commands:
      Copy/etc/init.d/nginx stop /etc/init.d/nginx start
    SQL services:
    • To restart MySQL, type the following commands:Copy/etc/init.d/mysql stop /etc/init.d/mysql start
    • To restart PostgreSQL, type the following commands:
      Copy/etc/init.d/pgsql stop /etc/init.d/pgsql start
    E-mail services:
    • To restart Postfix, type the following commands:Copy/etc/init.d/postfix stop /etc/init.d/postfix start
    • To restart Exim, type the following commands:
      Copy/etc/init.d/exim stop /etc/init.d/exim start
  3. Run the online test at http://filippo.io/Heartbleed to confirm that the server is no longer vulnerable.
Debian 7 and Ubuntu 12.04

To fix the HeartBleed vulnerability on Debian 7 (Wheezy) or Ubuntu 12.04 (Precise Pangolin), follow these steps:

  1. Install the latest updates on the server. For detailed information about how to do this, please see this article.
  2. Reboot the server or selectively restart any affected services:
    Web servers:
    • To restart the Apache web server, type the following commands:Copyservice apache2 stop service apache2 start
    • To restart the Nginx web server, type the following commands:
      Copyservice nginx stop service nginx start
    SQL services:
    • To restart MySQL, type the following commands:Copyservice mysql stop service mysql start
    • To restart PostgreSQL, type the following commands:
      Copyservice postgresql stop service postgresql start
    E-mail services:
    • To restart Postfix, type the following commands:Copyservice postfix stop service postfix start
    • To restart Exim, type the following commands:
      Copyservice exim stop service exim start
  3. Run the online test at http://filippo.io/Heartbleed to confirm that the server is no longer vulnerable.

More Information

For detailed information about the “Heartbleed” vulnerability, please visit http://heartbleed.com.

How to install Bolt using Softaculous

Still stuck? How can we help?

How can we help?

Was this page helpful? Yes No

Share this Doc

How to fix the Heartbleed vulnerability on unmanaged servers

Or copy link

Clipboard Icon
CONTENTS
Leaf Illustration

© 2023 All Rights Reserved by Hostvento