'Heartbleed' Bug Coder: 'It was a simple programming error'

NBC News Clone summarizes the latest on: Heartbleed Bug Coder It Was Simple Programming Error N78561 - Technology and Innovation | NBC News Clone. This article is rewritten and presented in a simplified tone for a better reader experience.

The man responsible for introducing the bug has expressed regret over the damage caused, but points out the error itself was 'trivial.'
Image: Heartbleed bug
There have been no documented instances of website attacks exploiting the Heartbleed bug.heartbleed.com via Tom's Guide

The coder responsible for the "Heartbleed" bug has expressed regret over the damage caused, but points out that the error itself was "quite trivial."

The German developer who introduced the bug in 2012, identified by the Sydney Morning Herald as Robin Seggelmann, explained that in coding terms the flaw was little more than a minor oversight: "It was a simple programming error in a new feature, which unfortunately occurred in a security relevant area."

Heartbleed, which some estimate to affect two thirds of all websites, made it possible to request data from servers that would normally be off-limits — almost any data held by the server, from credit card numbers to medical records, could be pulled up by exploiting the bug.

Image: Heartbleed bug
There have been no documented instances of website attacks exploiting the Heartbleed bug.heartbleed.com via Tom's Guide

The programming error also escaped the OpenSSL project's code reviewer, allowing it to enter the publicly released version of the software. There's no big software development team: OpenSSL is a small, open-source project managed by a community of coders who receive little or no pay.

This may seem incongruous with the fact that it is used by so many websites, but the software has become an industry standard regardless of its humble support base.

"It’s unfortunate that it’s used by millions of people, but only very few actually contribute to it," lamented Seggelmann. He also denied inserting the bug deliberately, an allegation that has been making the rounds.

The bug was simple enough to be fixed almost instantly by the OpenSSL team once they were alerted, but security is still at risk until websites update their servers with the new versions — a process which, for large websites like Tumblr, Gmail and Instagram, is far from trivial. Many websites are alerting their users to change passwords once the problem is fixed.

×
AdBlock Detected!
Please disable it to support our content.

Related Articles

Donald Trump Presidency Updates - Politics and Government | NBC News Clone | Inflation Rates 2025 Analysis - Business and Economy | NBC News Clone | Latest Vaccine Developments - Health and Medicine | NBC News Clone | Ukraine Russia Conflict Updates - World News | NBC News Clone | Openai Chatgpt News - Technology and Innovation | NBC News Clone | 2024 Paris Games Highlights - Sports and Recreation | NBC News Clone | Extreme Weather Events - Weather and Climate | NBC News Clone | Hollywood Updates - Entertainment and Celebrity | NBC News Clone | Government Transparency - Investigations and Analysis | NBC News Clone | Community Stories - Local News and Communities | NBC News Clone