4.3
CVSSv2

CVE-2014-3566

Published: 15/10/2014 Updated: 12/09/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.4 | Impact Score: 1.4 | Exploitability Score: 1.6
VMScore: 452
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The SSL protocol 3.0, as used in OpenSSL up to and including 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle malicious users to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux desktop supplementary 6.0

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server supplementary 6.0

redhat enterprise linux workstation supplementary 6.0

redhat enterprise linux workstation supplementary 7.0

redhat enterprise linux server supplementary 7.0

redhat enterprise linux 5

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux server supplementary 5.0

redhat enterprise linux workstation 6.0

redhat enterprise linux desktop supplementary 5.0

ibm aix 5.3

ibm aix 7.1

ibm aix 6.1

apple mac os x

mageia mageia 3.0

mageia mageia 4.0

novell suse linux enterprise desktop 9.0

novell suse linux enterprise desktop 11.0

novell suse linux enterprise desktop 10.0

novell suse linux enterprise desktop 12.0

novell suse linux enterprise server 12.0

opensuse opensuse 12.3

novell suse linux enterprise server 11.0

opensuse opensuse 13.1

novell suse linux enterprise software development kit 11.0

novell suse linux enterprise software development kit 12.0

fedoraproject fedora 20

fedoraproject fedora 21

fedoraproject fedora 19

openssl openssl 0.9.8b

openssl openssl 0.9.8m

openssl openssl 1.0.0n

openssl openssl 1.0.1

openssl openssl 0.9.8c

openssl openssl 1.0.0c

openssl openssl 1.0.0i

openssl openssl 1.0.0

openssl openssl 1.0.1h

openssl openssl 0.9.8n

openssl openssl 0.9.8p

openssl openssl 1.0.0m

openssl openssl 1.0.1c

openssl openssl 0.9.8e

openssl openssl 0.9.8u

openssl openssl 0.9.8za

openssl openssl 1.0.1g

openssl openssl 0.9.8g

openssl openssl 1.0.0h

openssl openssl 0.9.8k

openssl openssl 0.9.8d

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 0.9.8j

openssl openssl 1.0.0d

openssl openssl 1.0.0j

openssl openssl 0.9.8s

openssl openssl 1.0.1a

openssl openssl 0.9.8l

openssl openssl 1.0.1d

openssl openssl 1.0.0k

openssl openssl 0.9.8r

openssl openssl 0.9.8t

openssl openssl 0.9.8z

openssl openssl 0.9.8a

openssl openssl 1.0.1b

openssl openssl 0.9.8zb

openssl openssl 0.9.8o

openssl openssl 0.9.8q

openssl openssl 0.9.8w

openssl openssl 1.0.1e

openssl openssl 0.9.8

openssl openssl 1.0.1f

openssl openssl 1.0.0l

openssl openssl 0.9.8v

openssl openssl 0.9.8i

openssl openssl 0.9.8f

openssl openssl 0.9.8y

openssl openssl 1.0.0a

openssl openssl 0.9.8h

openssl openssl 0.9.8x

openssl openssl 1.0.1i

openssl openssl 1.0.0b

openssl openssl 1.0.0g

ibm vios 2.2.0.13

ibm vios 2.2.1.0

ibm vios 2.2.0.11

ibm vios 2.2.0.12

ibm vios 2.2.1.1

ibm vios 2.2.1.3

ibm vios 2.2.0.10

ibm vios 2.2.3.2

ibm vios 2.2.1.8

ibm vios 2.2.2.4

ibm vios 2.2.1.5

ibm vios 2.2.1.6

ibm vios 2.2.1.4

ibm vios 2.2.3.1

ibm vios 2.2.3.4

ibm vios 2.2.1.7

ibm vios 2.2.2.1

ibm vios 2.2.2.2

ibm vios 2.2.2.3

ibm vios 2.2.3.0

ibm vios 2.2.3.3

ibm vios 2.2.2.5

ibm vios 2.2.1.9

ibm vios 2.2.2.0

netbsd netbsd 6.1.1

netbsd netbsd 5.2.2

netbsd netbsd 5.1

netbsd netbsd 6.1.3

netbsd netbsd 6.0

netbsd netbsd 6.1.4

netbsd netbsd 6.0.4

netbsd netbsd 5.1.4

netbsd netbsd 6.0.6

netbsd netbsd 6.0.2

netbsd netbsd 5.1.2

netbsd netbsd 5.2.1

netbsd netbsd 5.1.3

netbsd netbsd 6.0.5

netbsd netbsd 6.1.2

netbsd netbsd 6.0.1

netbsd netbsd 5.1.1

netbsd netbsd 6.1.5

netbsd netbsd 5.2

netbsd netbsd 6.0.3

netbsd netbsd 6.1

debian debian linux 8.0

debian debian linux 7.0

oracle database 12.1.0.2

oracle database 11.2.0.4

Vendor Advisories

Several security issues were fixed in OpenJDK 7 ...
Several security issues were fixed in OpenJDK 6 ...
Debian Bug report logs - #771463 CVE-2014-8418 CVE-2014-8412 CVE-2014-8414 CVE-2014-8417 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 29 Nov 2014 21:36:01 UTC Severity: grave Tags: sec ...
Debian Bug report logs - #765539 Not possible to disable SSLv3 Package: pound; Maintainer for pound is Carsten Leonhardt <leo@debianorg>; Source for pound is src:pound (PTS, buildd, popcon) Reported by: Brian May <brian@microcomaustraliacomau> Date: Thu, 16 Oct 2014 01:09:02 UTC Severity: important Tags: security ...
Debian Bug report logs - #773230 asterisk: CVE-2014-9374 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 15 Dec 2014 20:30:02 UTC Severity: important Tags: fixed-upstream, security, ...
Synopsis Critical: java-170-oracle security update Type/Severity Security Advisory: Critical Topic Updated java-170-oracle packages that fix several security issues are nowavailable for Oracle Java for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Critical ...
Synopsis Important: java-180-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-180-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Important securityimpact Com ...
Synopsis Important: java-170-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-170-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 5Red Hat Product Security has rated this update as having Important securityimpact Com ...
Synopsis Critical: java-180-oracle security update Type/Severity Security Advisory: Critical Topic Updated java-180-oracle packages that fix several security issues are nowavailable for Oracle Java for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Critical securityi ...
Synopsis Important: java-160-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Important securityi ...
Synopsis Low: Red Hat Satellite IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Satellite 56Red Hat Product Security has rated this update as having Low securityimpact Common Vulnerab ...
Synopsis Critical: java-170-openjdk security update Type/Severity Security Advisory: Critical Topic Updated java-170-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 6 and 7Red Hat Product Security has rated this update as having Critical securityimpact ...
Synopsis Important: java-160-sun security update Type/Severity Security Advisory: Important Topic Updated java-160-sun packages that fix several security issues are nowavailable for Oracle Java for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Important se ...
Several vulnerabilities have been found in OpenSSL, the Secure Sockets Layer library and toolkit CVE-2014-3513 A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data A remote attacker could send multiple specially crafted handshake messages to exhaust all availabl ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, information disclosure or denial of service For the stable distribution (wheezy), these problems have been fixed in version 7u75-254-1~deb7u1 For the upcoming stable distribution (jessie), these p ...
Pound, a HTTP reverse proxy and load balancer, had several issues related to vulnerabilities in the Secure Sockets Layer (SSL) protocol For Debian 7 (wheezy) this update adds a missing part to make it actually possible to disable client-initiated renegotiation and disables it by default (CVE-2009-3555) TLS compression is disabled (CVE-2012-4929), ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, information disclosure or denial of service For the stable distribution (wheezy), these problems have been fixed in version 6b34-1136-1~deb7u1 We recommend that you upgrade your openjdk-6 packages ...
lighttpd, a small webserver, is vulnerable to the POODLE attack via the use of SSLv3 This protocol is now disabled by default For the oldstable distribution (wheezy), this problem has been fixed in version 1431-4+deb7u4 We recommend that you upgrade your lighttpd packages ...
A flaw was found in the way SSL 30 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data ...
A vulnerability in certain implementations of the TLSv1 protocol could allow an unauthenticated, remote attacker to access sensitive information The vulnerability is due to improper block cipher padding implemented in TLSv1 when using Cipher Block Chaining (CBC) mode An attacker could exploit the vulnerability to perform an "oracle padding" side ...
A flaw was found in the way SSL 30 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data ...
Bodo Moller, Thai Duong and Krzysztof Kotowicz of Google discovered a flaw in the design of SSL version 30 that would allow an attacker to calculate the plaintext of secure connections, allowing, for example, secure HTTP cookies to be stolen googleonlinesecurityblogspotcom/2014/10/this-poodle-bites-exploiting-ssl-30htmlwwwopens ...
Multiple flaws were found in the way the Hotspot component in OpenJDK verified bytecode from the class files, and in the way this component generated code for bytecode An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions (CVE-2014-6601, CVE-2015-0437) Multiple improper permission check issues ...
A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions (CVE-2014-6601) Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK An untrusted Java appli ...
A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions (CVE-2014-6601) Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK An untrusted Java appli ...
SSL 30 contains a flaw related to SSLv3 CBC-mode ciphers The issue is due to the block cipher padding not being deterministic and not covered by the MAC (Message Authentication Code) By sending a number of crafted requests to the server, an attacker can induce requests that will allow determining plaintext chunks of data When used in an automat ...
A potential security vulnerability has been identified with certain HP LaserJet Printers and MFPs, certain HP OfficeJet Printers and MFPs, and certain HP JetDirect Networking cards using OpenSSL This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE", which could be exploited remotely to allow disclo ...
A potential security vulnerability has been identified with certain HP LaserJet Printers and MFPs, certain HP OfficeJet Printers and MFPs, and certain HP JetDirect Networking cards using OpenSSL This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE", which could be exploited remotely to allow disclo ...
Description of Problem The recently disclosed protocol flaw in SSLv3, referred to as CVE-2014-3566 (cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2014-3566) or POODLE, could expose some deployments that support SSLv3 to a risk of an active Man in the Middle (MITM) attack A successful attack could lead to the disclosure of the information that ...
Description of Problem A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler-based hardware appliances: Citrix NetScaler Application Delivery Controller (ADC) Citrix NetScaler Gateway Citrix NetScaler Service Delivery Appliance Citrix CloudBridge (now NetScaler S ...

Exploits

Article discussing the SSL 30 fallback and POODLE vulnerabilities Proof of concept code included ...

Nmap Scripts

ssl-poodle

Checks whether SSLv3 CBC ciphers are allowed (POODLE)

nmap -sV --version-light --script ssl-poodle -p 443 <host>

PORT STATE SERVICE REASON 443/tcp open https syn-ack | ssl-poodle: | VULNERABLE: | SSL POODLE information leak | State: VULNERABLE | IDs: CVE:CVE-2014-3566 OSVDB:113251 | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and | other products, uses nondeterministic CBC padding, which makes it easier | for man-in-the-middle attackers to obtain cleartext data via a | padding-oracle attack, aka the "POODLE" issue. | Disclosure date: 2014-10-14 | Check results: | TLS_RSA_WITH_3DES_EDE_CBC_SHA | References: | https://www.imperialviolet.org/2014/10/14/poodle.html | http://osvdb.org/113251 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 |_ https://www.openssl.org/~bodo/ssl-poodle.pdf

Github Repositories

VoipNow Patches Repository This repository contains a list of quick-fix patches that can be applied to VoipNow The following table contains a description of the available patches: File Name Date Description sslpoodlefixsh 20141016 Fix SSLv3 vulnerability (CVE-2014-3566) in VoipNow 2xx - 305

Bouncer is a network TCP port redirector/forward proxy (like rinetd) with extra features like Reverse tunneling (like ssh -R), SSL tunneling (like stunnel), connection Failover, LoadBalancing and Clustering. In pure Java (BIO)

Bouncer (TCP) Bouncer is an open source (Apache License, Version 20) Java network proxy Do not require any external lib Current Stable Version is 2211 DOC fork from ggrandes/bouncer modify: modify bouncersh can run in AIX,modify date command modify bouncersh not need modify BOUNCER_HOME modify bouncersh can define JAVA_HOME Schema about Forward / Port Redirector (you

CLI search tool for debian security tracker

Debsec Tool for searching the debian security tracker for a bunch of CVEs in bulk Usage May% echo CVE-2014-3566 &gt; /cves May% /debsec -distro wheezy-security &lt; cves 2015/03/20 17:20:06 WARNING: CVE-2014-3566 is open on wheezy-security for pkg gnutls26: security-trackerdebianorg/tracker/redirect/CVE-2014-3566 2015/03/20 17:20:06 WARNING: CVE-2014-3566 is

CVE-2014-3566-poodle This cookbook will error out your chef run if your server is vulnerable to CVE-2014-3566 Although this cookbook can be used to watch for failed chef runs, it is also a proof of concept Supported Platforms Ubuntu 1204 Centos-64 Attributes Key Type Description Default ['CVE-2014-3566-poodle']['ports']

Backport to allow for the disabling of SSLv3 in the Debian Squeeze version of lighttpd

lighttpd POODLE for Debian Squeeze First Version (161) Patch to enable the of the ssluse-sslv3 config option to allow Debian Squeeze users to address CVE-2014-3566 (aka POODLE), without having to upgrade to Wheezy Created initially from a stripped down diff of vanilla lighttpd 1428 -&gt; 1429 Customised for the patchset already applied to 1428-2+squeeze16 apt-g

Bouncer is a network TCP port redirector/forward proxy (like rinetd) with extra features like Reverse tunneling (like ssh -R), SSL tunneling (like stunnel), connection Failover, LoadBalancing and Clustering. In pure Java (BIO)

Bouncer (TCP) Bouncer is an open source (Apache License, Version 20) Java network proxy Do not require any external lib Current Stable Version is 2211 DOC Schema about Forward / Port Redirector (you need ONE bouncer): Machine-A (Client) init connection to Machine-B (Bouncer) Machine-B init connection to Machine-C (Server) Done: Machine-A is able to speak with Machine-C

Checking the Vulnerability in SSL V3 Proto

poodle_check Checking the Vulnerability in SSL V3 Proto Introduction On October 14th, 2014, a vulnerability in version 3 of the SSL encryption protocol was disclosed This vulnerability, dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption), allows an attacker to read information encrypted with this version of the protocol in plain text using a man-in-the-middle attack

Quick fix for AWS ELBs SSL Security Policy preventing POODLE issue with SSL vunerability

aws_poodle_fix Quick fix for AWS ELBs SSL Security Policy preventing POODLE issue with SSL vunerability ###requirements: boto api: $ pip install boto Reference: awsamazoncom/pt/security/security-bulletins/CVE-2014-3566-advisory/

4PSA DNS Manager Patches Repository This repository contains a list of quick-fix patches that can be applied to DNS Manager The following table contains a description of the available patches: File Name Date Description sslpoodlefixsh 20141016 Fix SSLv3 vulnerability (CVE-2014-3566) in DNS Manager &gt;300

ric13351 VxWorks 61 FALLBACK_SCSV support for CVE-2014-3566

non-controlflow-hijacking-datasets Introduction The aim of this readme file is introducing a dataset for utilizing low-level hardware information to detect Non-Control-Flow hijacking attacks Multiple traditional techniques have been proposed to defend computing systems against malware attacks that hijack the control-flow of the victim program (control-oriented attacks) Howeve

Test Poodle Exploit on a linux server using bash

froggPoodler Vulnerability POODLE CVE-2014-3566 this code is used to test Poodle vulnerability on SSL3 exploit, based on Dan Varga works (from redhat) script I made some change and now the Poodle vulnerability check is more clean for me =&gt; Script call : bash poodlesh {serverIP} {serverPort} info : serverIP and serverPort are optional =&gt; 20141017 - Frogg c

Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566)

poodle_protector poodle_protectorpy is a Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566) It scans your Apache server configuration directories for unsecure configuration directives and ensures security by disabling SSL 20 and 30 It can also restart your server instantly after customizing the configuration Currently this

Download and run Dirk Wetter's testssl.sh on a list of url's and compile the failures into a single spreadsheet.

Test SSL Given a list of urls, run Dirk Wetter's testsslsh on each and tabulate failures only into a single spreadheet List of URLS to test These should be put in urlstxt on separate lines Run standalone /cloneRunAndAggregatesh The file results/failscsv will be generated Example If urlstxt consists of googlecom yahoocom m

This module is an example profile to manage RHEL system configurations that comply with various regulations such as STIG, PCI, HIPAA, and more

About this Module This module is an example of how to use the System Integrity Monitoring Platform (SIMP) Puppet modules released by the National Security Agency (NSA) In addition to the example profile, an example Puppetfile and Hiera data are also provided Getting Started Adding the Modules This repository contains an example Puppetfile that can be used with Puppet Enterpri

Auto Remediation for Lacework Alerts with Kaholo

lacework-kaholo-autoremediation This repository is a collection of Kaholoio maps you can use as examples to automate the remediation of Lacework events and compliance reports What is Auto Remediation? Auto remediation is the concept to automate the response to events and alerts with automated steps that are able to fix or remediate underlying conditions and misconfigurations

Домашнее задание "Уязвимости и атаки на информационные системы" - Подус Сергей Задание 1 Скачайте и установите виртуальную машину Metasploitable: sourceforgenet/projects/metasploitable/ Это типовая ОС для экспериментов в о

CTF machine Writeup

VULNIX writeup nmap -p- Target_ip 2 nmap -sV -A —script vuln Target_ip root@v5ha1i:~# nmap -sV -A --script Vuln 192168122130 Starting Nmap 770 ( nmaporg ) at 2020-06-18 02:23 EDT Nmap scan report for 192168122130 Host is up (00017s latency) Not shown: 988 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 59p1 Debian

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range f

Vulnerability Checks heartbleedsh - CVE-2014-0160 poodlesh - CVE-2014-3566 freaksh - CVE-2015-0204

MassBleed SSL Vulnerability Scanner

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range f

crypto vulnerabilities POODLE(Padding Oracle On Downgraded Legacy Encryption) In SSL 30 protocol, to encrypts plaintext message, it first creates a MAC and appends the MAC to the message(MAC-then-Encrypt) Padding is then added at the end to make the message an integral number of blocks in length Note that padding length is not covered by MAC Also content of padding is also

PROJECT AUTHOR DATE MEASUREMENTS Daniel Kubec &lt;niel@rtfmcz&gt; June 2013 Network Measurements and Statistical Analysis This comprehensive system ensures that each measurements enable immediate and actionable insights, allowing users to discern the implications of the data and how it can be applied to enhance network security, performance, or compliance Abstr

ric13351 VxWorks 61 Support for TLS_FALLBACK_SCSV for CVE-2014-3566 (POODLE)

CTF machine Writeup

VULNIX writeup nmap -p- Target_ip 2 nmap -sV -A —script vuln Target_ip root@v5ha1i:~# nmap -sV -A --script Vuln 192168122130 Starting Nmap 770 ( nmaporg ) at 2020-06-18 02:23 EDT Nmap scan report for 192168122130 Host is up (00017s latency) Not shown: 988 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 59p1 Debian

References

CWE-310https://www.openssl.org/~bodo/ssl-poodle.pdfhttp://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.htmlhttp://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.htmlhttps://bugzilla.mozilla.org/show_bug.cgi?id=1076983https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-iphttp://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspxhttp://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=1152789https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.htmlhttps://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/https://access.redhat.com/articles/1232123https://www.imperialviolet.org/2014/10/14/poodle.htmlhttp://marc.info/?l=openssl-dev&m=141333049205629&w=2http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566https://technet.microsoft.com/library/security/3009008.aspxhttps://www.suse.com/support/kb/doc.php?id=7015773http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.htmlhttps://support.apple.com/kb/HT6536http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodlehttps://support.apple.com/kb/HT6542https://support.apple.com/kb/HT6541http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.htmlhttps://support.apple.com/kb/HT6535http://www.securityfocus.com/archive/1/533746http://www.securityfocus.com/archive/1/533747http://www.securitytracker.com/id/1031096http://www.securitytracker.com/id/1031085http://secunia.com/advisories/60056http://www.securitytracker.com/id/1031029http://www.securitytracker.com/id/1031092http://www.securityfocus.com/bid/70574http://www.securitytracker.com/id/1031088https://support.apple.com/kb/HT6527http://www.securitytracker.com/id/1031095http://secunia.com/advisories/61827http://secunia.com/advisories/61345http://www.securitytracker.com/id/1031091https://support.apple.com/kb/HT6531https://bto.bluecoat.com/security-advisory/sa83http://www.securitytracker.com/id/1031105http://secunia.com/advisories/60792http://secunia.com/advisories/61303http://www.securitytracker.com/id/1031123http://www.securitytracker.com/id/1031087http://www.securitytracker.com/id/1031107http://www.securitytracker.com/id/1031094http://www.mandriva.com/security/advisories?name=MDVSA-2014:203http://www.securitytracker.com/id/1031090http://secunia.com/advisories/61810http://www-01.ibm.com/support/docview.wss?uid=swg21687172http://secunia.com/advisories/61019http://www.securitytracker.com/id/1031039http://www.securitytracker.com/id/1031093http://secunia.com/advisories/61825http://www.securitytracker.com/id/1031106http://www.securitytracker.com/id/1031086https://support.apple.com/kb/HT6529http://secunia.com/advisories/61782http://www.securitytracker.com/id/1031089http://secunia.com/advisories/61359http://rhn.redhat.com/errata/RHSA-2014-1652.htmlhttp://marc.info/?l=bugtraq&m=141477196830952&w=2http://www.kb.cert.org/vuls/id/577193http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.htmlhttp://marc.info/?l=bugtraq&m=141450452204552&w=2http://marc.info/?l=bugtraq&m=141450973807288&w=2http://www.debian.org/security/2014/dsa-3053https://www.openssl.org/news/secadv_20141015.txthttp://www.us-cert.gov/ncas/alerts/TA14-290Ahttp://rhn.redhat.com/errata/RHSA-2014-1692.htmlhttp://www-01.ibm.com/support/docview.wss?uid=isg3T1021439http://secunia.com/advisories/61926ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.aschttp://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.htmlhttp://www-01.ibm.com/support/docview.wss?uid=isg3T1021431http://www-01.ibm.com/support/docview.wss?uid=swg21686997http://secunia.com/advisories/61819http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/http://advisories.mageia.org/MGASA-2014-0416.htmlhttp://www.securitytracker.com/id/1031131http://secunia.com/advisories/61130https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6http://secunia.com/advisories/60859http://www.securitytracker.com/id/1031130http://www.securitytracker.com/id/1031120http://secunia.com/advisories/61995http://support.citrix.com/article/CTX200238http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.htmlhttp://www.securitytracker.com/id/1031132http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.htmlhttp://secunia.com/advisories/60206http://secunia.com/advisories/59627http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.aschttp://secunia.com/advisories/61316http://rhn.redhat.com/errata/RHSA-2014-1653.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.htmlhttp://www.securitytracker.com/id/1031124http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.htmlhttp://www-01.ibm.com/support/docview.wss?uid=swg21687611http://marc.info/?l=bugtraq&m=141703183219781&w=2http://marc.info/?l=bugtraq&m=141697676231104&w=2http://marc.info/?l=bugtraq&m=141715130023061&w=2http://marc.info/?l=bugtraq&m=141694355519663&w=2http://www-01.ibm.com/support/docview.wss?uid=swg21688283http://downloads.asterisk.org/pub/security/AST-2014-011.htmlhttp://marc.info/?l=bugtraq&m=141697638231025&w=2http://rhn.redhat.com/errata/RHSA-2014-1880.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1876.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1881.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1882.htmlhttps://www-01.ibm.com/support/docview.wss?uid=swg21688165http://rhn.redhat.com/errata/RHSA-2014-1877.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1920.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1948.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.htmlhttp://marc.info/?l=bugtraq&m=141775427104070&w=2http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlhttp://support.apple.com/HT204244http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=141813976718456&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://www.debian.org/security/2015/dsa-3144http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://www.debian.org/security/2015/dsa-3147http://marc.info/?l=bugtraq&m=142546741516006&w=2http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.htmlhttp://marc.info/?l=bugtraq&m=142350196615714&w=2http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.htmlhttp://www.ubuntu.com/usn/USN-2486-1http://marc.info/?l=bugtraq&m=141879378918327&w=2http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.htmlhttp://marc.info/?l=bugtraq&m=142350298616097&w=2http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.htmlhttp://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.htmlhttp://www.ubuntu.com/usn/USN-2487-1http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0080.htmlhttp://marc.info/?l=bugtraq&m=142624619906067http://marc.info/?l=bugtraq&m=142607790919348&w=2http://rhn.redhat.com/errata/RHSA-2015-0086.htmlhttp://marc.info/?l=bugtraq&m=142624619906067&w=2http://rhn.redhat.com/errata/RHSA-2015-0264.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0085.htmlhttp://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581http://marc.info/?l=bugtraq&m=142624590206005&w=2http://rhn.redhat.com/errata/RHSA-2015-0068.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0079.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.htmlhttp://marc.info/?l=bugtraq&m=142660345230545&w=2http://rhn.redhat.com/errata/RHSA-2015-0698.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0http://marc.info/?l=bugtraq&m=142740155824959&w=2http://www.mandriva.com/security/advisories?name=MDVSA-2015:062http://marc.info/?l=bugtraq&m=142791032306609&w=2http://marc.info/?l=bugtraq&m=142805027510172&w=2http://marc.info/?l=bugtraq&m=142804214608580&w=2http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlhttp://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://www.debian.org/security/2015/dsa-3253https://www.elastic.co/blog/logstash-1-4-3-releasedhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1545.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1546.htmlhttps://support.apple.com/HT205217http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlhttp://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdfhttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681http://www.vmware.com/security/advisories/VMSA-2015-0003.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttps://security.gentoo.org/glsa/201606-11http://marc.info/?l=bugtraq&m=145983526810210&w=2http://marc.info/?l=bugtraq&m=144101915224472&w=2http://marc.info/?l=bugtraq&m=143558192010071&w=2http://marc.info/?l=bugtraq&m=143290371927178&w=2http://marc.info/?l=bugtraq&m=144251162130364&w=2http://marc.info/?l=bugtraq&m=142962817202793&w=2http://marc.info/?l=bugtraq&m=143290437727362&w=2http://marc.info/?l=bugtraq&m=143628269912142&w=2http://marc.info/?l=bugtraq&m=141628688425177&w=2http://marc.info/?l=bugtraq&m=144294141001552&w=2http://marc.info/?l=bugtraq&m=141577350823734&w=2http://marc.info/?l=bugtraq&m=143290522027658&w=2http://marc.info/?l=bugtraq&m=141620103726640&w=2http://marc.info/?l=bugtraq&m=141576815022399&w=2http://marc.info/?l=bugtraq&m=143558137709884&w=2http://marc.info/?l=bugtraq&m=141577087123040&w=2http://marc.info/?l=bugtraq&m=143290583027876&w=2http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttps://support.lenovo.com/product_security/poodlehttp://www.debian.org/security/2016/dsa-3489http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htmhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.htmlhttp://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034https://support.lenovo.com/us/en/product_security/poodlehttps://security.gentoo.org/glsa/201507-14https://kc.mcafee.com/corporate/index?page=content&id=SB10104https://kc.mcafee.com/corporate/index?page=content&id=SB10091https://kc.mcafee.com/corporate/index?page=content&id=SB10090http://www-01.ibm.com/support/docview.wss?uid=swg21692299https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttps://security.netapp.com/advisory/ntap-20141015-0001/https://support.citrix.com/article/CTX216642https://puppet.com/security/cve/poodle-sslv3-vulnerabilityhttps://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02https://github.com/mpgn/poodle-PoChttp://www.securityfocus.com/archive/1/533724/100/0/threadedhttps://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3Ehttps://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJUhttps://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3Ehttps://nvd.nist.govhttps://usn.ubuntu.com/2487-1/