Just wanted to publish this on here as the impact is extremely broad and extends well beyond just this site.
Please read through the article I've quoted below, most of it won't make sense but will help answer some of the questions around it as you see this surface in the news over the next few days.
A good rule of thumb: Assume your passwords have been compromised on any internet site you use and change them.
This means websites for your banks, credit cards, investments, hobby related sites, email accounts, etc.
Not all will be impacted (only those running OpenSSL), and there is no way to trace which ones may have been compromised since there is no traceability apparently.
So err on the side of caution and change them once your respective account sites publish updates (they'll probably email or otherwise notify you about it).
As far as NJ Woods & Water, I've ensured it's been patched by my server support and have also reissued the SSL certs for the sake of thoroughness.
So this site is patched and no longer vulenerable, but I would recommend you change your passwords (for the sake of thoroughness on your part)...although I highly doubt this site was targeted...better to be safe than sorry
There is a major flaw in the security of the World Wide Web — one that has even Internet security firms feeling a little panicked.
A massive vulnerability has been found in OpenSSL, the open-source software package broadly used to encrypt Web communications. The flaw allows attackers to steal the information that is normally protected by SSL/TLS encryption, which is used to protect Web applications, e-mail communications, instant messaging (IM) and some virtual private networks (VPNs).
Essentially, that means a lot of Internet users are affected. And potentially, passwords, private communications and even credit card information could be available to hackers courtesy of this newly-discovered bug.
Dubbed the Heart Bleed Bug, the flaw was jointly discovered by a team of security engineers at Codenomicon and Neel Mehta of Google Security.
“The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software,” reads a Web pagedevoted to explaining the massive bug.
“This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users.”
The security researches added that they tested their own services to see how bad the flaw is — and it is BAD.
“We attacked ourselves from outside, without leaving a trace,” the post reads. “Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, e-mails and business critical documents and communication.”
The security experts say the Internet will remain vulnerable as long as the flawed version of OpenSSL is in use. Although Fixed OpenSSL has been released, it must be deployed.
“Operating system vendors and distribution, appliance vendors, independent software vendors have to adopt the fix and notify their users,” the post says. “Service providers and users have to install the fix as it becomes available for the operating systems, networked appliances and software they use.”
The following is an excerpt from the website’s Q&A on the Heart Bleed Bug and how it affects the average user:
Q: Am I affected by the bug?
A: You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company’s site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL. Many of online services use TLS to both to identify themselves to you and to protect your privacy and transactions. You might have networked appliances with logins secured by this buggy implementation of the TLS. Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services.
Q: Can I detect if someone has exploited this against me?
A: Exploitation of this bug leaves no traces of anything abnormal happening to the logs.
Q: Is there a bright side to all this?
A: For those service providers who are affected this is a good opportunity to upgrade security strength of the secret keys used. A lot of software gets updates which otherwise would have not been urgent. Although this is painful for the security community, we can rest assured that infrastructure of the cyber criminals and their secrets have been exposed as well.
And more information can be found at http://heartbleed.com/