First published: Wed Oct 15 2014(Updated: )
Bodo Möller, Thai Duong and Krzysztof Kotowicz of Google discovered a flaw in the design of SSL version 3.0 that would allow an attacker to calculate the plaintext of secure connections, allowing, for example, secure HTTP cookies to be stolen. References: <a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html</a> <a href="https://www.openssl.org/~bodo/ssl-poodle.pdf">https://www.openssl.org/~bodo/ssl-poodle.pdf</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise linux desktop supplementary | =5.0 | |
redhat enterprise linux desktop supplementary | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
Red Hat Enterprise Linux Server Supplementary | =5.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 | |
Red Hat Enterprise Linux Workstation Supplementary | =7.0 | |
IBM AIX | =5.3 | |
IBM AIX | =6.1 | |
IBM AIX | =7.1 | |
Apple iOS and macOS | <=10.10.1 | |
Mageia | =3.0 | |
Mageia | =4.0 | |
SUSE Linux Enterprise Desktop | =9.0 | |
SUSE Linux Enterprise Desktop | =10.0 | |
SUSE Linux Enterprise Desktop | =11.0 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp3 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
SUSE Linux Enterprise Server | =11.0-sp3 | |
novell suse linux enterprise server vmware | =11.0-sp3 | |
SUSE Linux Enterprise Server | =12.0 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Fedora | =19 | |
Fedora | =20 | |
Fedora | =21 | |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =0.9.8a | |
OpenSSL libcrypto | =0.9.8b | |
OpenSSL libcrypto | =0.9.8c | |
OpenSSL libcrypto | =0.9.8d | |
OpenSSL libcrypto | =0.9.8e | |
OpenSSL libcrypto | =0.9.8f | |
OpenSSL libcrypto | =0.9.8g | |
OpenSSL libcrypto | =0.9.8h | |
OpenSSL libcrypto | =0.9.8i | |
OpenSSL libcrypto | =0.9.8j | |
OpenSSL libcrypto | =0.9.8k | |
OpenSSL libcrypto | =0.9.8l | |
OpenSSL libcrypto | =0.9.8m | |
OpenSSL libcrypto | =0.9.8m-beta1 | |
OpenSSL libcrypto | =0.9.8n | |
OpenSSL libcrypto | =0.9.8o | |
OpenSSL libcrypto | =0.9.8p | |
OpenSSL libcrypto | =0.9.8q | |
OpenSSL libcrypto | =0.9.8r | |
OpenSSL libcrypto | =0.9.8s | |
OpenSSL libcrypto | =0.9.8t | |
OpenSSL libcrypto | =0.9.8u | |
OpenSSL libcrypto | =0.9.8v | |
OpenSSL libcrypto | =0.9.8w | |
OpenSSL libcrypto | =0.9.8x | |
OpenSSL libcrypto | =0.9.8y | |
OpenSSL libcrypto | =0.9.8z | |
OpenSSL libcrypto | =0.9.8za | |
OpenSSL libcrypto | =0.9.8zb | |
OpenSSL libcrypto | =1.0.0 | |
OpenSSL libcrypto | =1.0.0-beta1 | |
OpenSSL libcrypto | =1.0.0-beta2 | |
OpenSSL libcrypto | =1.0.0-beta3 | |
OpenSSL libcrypto | =1.0.0-beta4 | |
OpenSSL libcrypto | =1.0.0-beta5 | |
OpenSSL libcrypto | =1.0.0a | |
OpenSSL libcrypto | =1.0.0b | |
OpenSSL libcrypto | =1.0.0c | |
OpenSSL libcrypto | =1.0.0d | |
OpenSSL libcrypto | =1.0.0e | |
OpenSSL libcrypto | =1.0.0f | |
OpenSSL libcrypto | =1.0.0g | |
OpenSSL libcrypto | =1.0.0h | |
OpenSSL libcrypto | =1.0.0i | |
OpenSSL libcrypto | =1.0.0j | |
OpenSSL libcrypto | =1.0.0k | |
OpenSSL libcrypto | =1.0.0l | |
OpenSSL libcrypto | =1.0.0m | |
OpenSSL libcrypto | =1.0.0n | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h | |
OpenSSL libcrypto | =1.0.1i | |
IBM VIOS | =2.2.0.10 | |
IBM VIOS | =2.2.0.11 | |
IBM VIOS | =2.2.0.12 | |
IBM VIOS | =2.2.0.13 | |
IBM VIOS | =2.2.1.0 | |
IBM VIOS | =2.2.1.1 | |
IBM VIOS | =2.2.1.3 | |
IBM VIOS | =2.2.1.4 | |
IBM VIOS | =2.2.1.5 | |
IBM VIOS | =2.2.1.6 | |
IBM VIOS | =2.2.1.7 | |
IBM VIOS | =2.2.1.8 | |
IBM VIOS | =2.2.1.9 | |
IBM VIOS | =2.2.2.0 | |
IBM VIOS | =2.2.2.1 | |
IBM VIOS | =2.2.2.2 | |
IBM VIOS | =2.2.2.3 | |
IBM VIOS | =2.2.2.4 | |
IBM VIOS | =2.2.2.5 | |
IBM VIOS | =2.2.3.0 | |
IBM VIOS | =2.2.3.1 | |
IBM VIOS | =2.2.3.2 | |
IBM VIOS | =2.2.3.3 | |
IBM VIOS | =2.2.3.4 | |
NetBSD NetBSD | =5.1 | |
NetBSD NetBSD | =5.1.1 | |
NetBSD NetBSD | =5.1.2 | |
NetBSD NetBSD | =5.1.3 | |
NetBSD NetBSD | =5.1.4 | |
NetBSD NetBSD | =5.2 | |
NetBSD NetBSD | =5.2.1 | |
NetBSD NetBSD | =5.2.2 | |
NetBSD NetBSD | =6.0 | |
NetBSD NetBSD | =6.0-beta | |
NetBSD NetBSD | =6.0.1 | |
NetBSD NetBSD | =6.0.2 | |
NetBSD NetBSD | =6.0.3 | |
NetBSD NetBSD | =6.0.4 | |
NetBSD NetBSD | =6.0.5 | |
NetBSD NetBSD | =6.0.6 | |
NetBSD NetBSD | =6.1 | |
NetBSD NetBSD | =6.1.1 | |
NetBSD NetBSD | =6.1.2 | |
NetBSD NetBSD | =6.1.3 | |
NetBSD NetBSD | =6.1.4 | |
NetBSD NetBSD | =6.1.5 | |
Debian | =7.0 | |
Debian | =8.0 | |
Oracle Database | =11.2.0.4 | |
Oracle Database | =12.1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3566 is classified as a high-severity vulnerability due to its potential to allow attackers to decrypt secure connections.
To fix CVE-2014-3566, it is recommended to disable SSL 3.0 in your servers and applications, and switch to TLS.
CVE-2014-3566 affects various versions of operating systems and software including Red Hat, IBM AIX, macOS, and different distributions of Linux.
Exploiting CVE-2014-3566 allows attackers to decrypt confidential data transmitted over SSL connections, potentially stealing sensitive information such as cookies.
Yes, as a temporary workaround for CVE-2014-3566, administrators can restrict the use of SSL 3.0 until a permanent fix is implemented.