3.4
CVSSv3

CVE-2014-3566

CVSSv4: NA | CVSSv3: 3.4 | CVSSv2: 4.3 | VMScore: 440 | EPSS: 0.94196 | KEV: Not Included
Published: 15/10/2014 Updated: 12/04/2025

Vulnerability Summary

The SSL protocol 3.0, as used in OpenSSL up to and including 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle malicious users to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 5

redhat enterprise linux desktop 6.0

redhat enterprise linux desktop 7.0

redhat enterprise linux desktop supplementary 5.0

redhat enterprise linux desktop supplementary 6.0

redhat enterprise linux server 6.0

redhat enterprise linux server 7.0

redhat enterprise linux server supplementary 5.0

redhat enterprise linux server supplementary 6.0

redhat enterprise linux server supplementary 7.0

redhat enterprise linux workstation 6.0

redhat enterprise linux workstation 7.0

redhat enterprise linux workstation supplementary 6.0

redhat enterprise linux workstation supplementary 7.0

ibm aix 5.3

ibm aix 6.1

ibm aix 7.1

apple mac os x

mageia mageia 3.0

mageia mageia 4.0

novell suse linux enterprise desktop 9.0

novell suse linux enterprise desktop 10.0

novell suse linux enterprise desktop 11.0

novell suse linux enterprise desktop 12.0

novell suse linux enterprise software development kit 11.0

novell suse linux enterprise software development kit 12.0

novell suse linux enterprise server 11.0

novell suse linux enterprise server 12.0

opensuse opensuse 12.3

opensuse opensuse 13.1

fedoraproject fedora 19

fedoraproject fedora 20

fedoraproject fedora 21

openssl openssl 0.9.8

openssl openssl 0.9.8a

openssl openssl 0.9.8b

openssl openssl 0.9.8c

openssl openssl 0.9.8d

openssl openssl 0.9.8e

openssl openssl 0.9.8f

openssl openssl 0.9.8g

openssl openssl 0.9.8h

openssl openssl 0.9.8i

openssl openssl 0.9.8j

openssl openssl 0.9.8k

openssl openssl 0.9.8l

openssl openssl 0.9.8m

openssl openssl 0.9.8n

openssl openssl 0.9.8o

openssl openssl 0.9.8p

openssl openssl 0.9.8q

openssl openssl 0.9.8r

openssl openssl 0.9.8s

openssl openssl 0.9.8t

openssl openssl 0.9.8u

openssl openssl 0.9.8v

openssl openssl 0.9.8w

openssl openssl 0.9.8x

openssl openssl 0.9.8y

openssl openssl 0.9.8z

openssl openssl 0.9.8za

openssl openssl 0.9.8zb

openssl openssl 1.0.0

openssl openssl 1.0.0a

openssl openssl 1.0.0b

openssl openssl 1.0.0c

openssl openssl 1.0.0d

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 1.0.0g

openssl openssl 1.0.0h

openssl openssl 1.0.0i

openssl openssl 1.0.0j

openssl openssl 1.0.0k

openssl openssl 1.0.0l

openssl openssl 1.0.0m

openssl openssl 1.0.0n

openssl openssl 1.0.1

openssl openssl 1.0.1a

openssl openssl 1.0.1b

openssl openssl 1.0.1c

openssl openssl 1.0.1d

openssl openssl 1.0.1e

openssl openssl 1.0.1f

openssl openssl 1.0.1g

openssl openssl 1.0.1h

openssl openssl 1.0.1i

ibm vios 2.2.0.10

ibm vios 2.2.0.11

ibm vios 2.2.0.12

ibm vios 2.2.0.13

ibm vios 2.2.1.0

ibm vios 2.2.1.1

ibm vios 2.2.1.3

ibm vios 2.2.1.4

ibm vios 2.2.1.5

ibm vios 2.2.1.6

ibm vios 2.2.1.7

ibm vios 2.2.1.8

ibm vios 2.2.1.9

ibm vios 2.2.2.0

ibm vios 2.2.2.1

ibm vios 2.2.2.2

ibm vios 2.2.2.3

ibm vios 2.2.2.4

ibm vios 2.2.2.5

ibm vios 2.2.3.0

ibm vios 2.2.3.1

ibm vios 2.2.3.2

ibm vios 2.2.3.3

ibm vios 2.2.3.4

netbsd netbsd 5.1

netbsd netbsd 5.1.1

netbsd netbsd 5.1.2

netbsd netbsd 5.1.3

netbsd netbsd 5.1.4

netbsd netbsd 5.2

netbsd netbsd 5.2.1

netbsd netbsd 5.2.2

netbsd netbsd 6.0

netbsd netbsd 6.0.1

netbsd netbsd 6.0.2

netbsd netbsd 6.0.3

netbsd netbsd 6.0.4

netbsd netbsd 6.0.5

netbsd netbsd 6.0.6

netbsd netbsd 6.1

netbsd netbsd 6.1.1

netbsd netbsd 6.1.2

netbsd netbsd 6.1.3

netbsd netbsd 6.1.4

netbsd netbsd 6.1.5

debian debian linux 7.0

debian debian linux 8.0

oracle database 11.2.0.4

oracle database 12.1.0.2

Vendor Advisories

Several security issues were fixed in OpenJDK 6 ...
Several security issues were fixed in OpenJDK 7 ...
Debian Bug report logs - #773230 asterisk: CVE-2014-9374 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 15 Dec 2014 20:30:02 UTC Severity: important Tags: fixed-upstream, security, ...
Debian Bug report logs - #771463 CVE-2014-8418 CVE-2014-8412 CVE-2014-8414 CVE-2014-8417 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 29 Nov 2014 21:36:01 UTC Severity: grave Tags: sec ...
Debian Bug report logs - #765539 Not possible to disable SSLv3 Package: pound; Maintainer for pound is Carsten Leonhardt <leo@debianorg>; Source for pound is src:pound (PTS, buildd, popcon) Reported by: Brian May <brian@microcomaustraliacomau> Date: Thu, 16 Oct 2014 01:09:02 UTC Severity: important Tags: security ...
Synopsis Critical: java-170-oracle security update Type/Severity Security Advisory: Critical Topic Updated java-170-oracle packages that fix several security issues are nowavailable for Oracle Java for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Critical ...
Synopsis Low: Red Hat Satellite IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Satellite 56Red Hat Product Security has rated this update as having Low securityimpact Common Vulnerab ...
Synopsis Critical: java-170-openjdk security update Type/Severity Security Advisory: Critical Topic Updated java-170-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 6 and 7Red Hat Product Security has rated this update as having Critical securityimpact ...
Synopsis Important: java-160-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Important securityi ...
Synopsis Important: java-170-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-170-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 5Red Hat Product Security has rated this update as having Important securityimpact Com ...
Synopsis Important: java-180-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-180-openjdk packages that fix multiple security issues arenow available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Important securityimpact Com ...
Synopsis Critical: java-180-oracle security update Type/Severity Security Advisory: Critical Topic Updated java-180-oracle packages that fix several security issues are nowavailable for Oracle Java for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Critical securityi ...
Synopsis Important: java-160-sun security update Type/Severity Security Advisory: Important Topic Updated java-160-sun packages that fix several security issues are nowavailable for Oracle Java for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Important se ...
lighttpd, a small webserver, is vulnerable to the POODLE attack via the use of SSLv3 This protocol is now disabled by default For the oldstable distribution (wheezy), this problem has been fixed in version 1431-4+deb7u4 We recommend that you upgrade your lighttpd packages ...
Several vulnerabilities have been found in OpenSSL, the Secure Sockets Layer library and toolkit CVE-2014-3513 A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data A remote attacker could send multiple specially crafted handshake messages to exhaust all availabl ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, information disclosure or denial of service For the stable distribution (wheezy), these problems have been fixed in version 6b34-1136-1~deb7u1 We recommend that you upgrade your openjdk-6 packages ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, information disclosure or denial of service For the stable distribution (wheezy), these problems have been fixed in version 7u75-254-1~deb7u1 For the upcoming stable distribution (jessie), these p ...
Pound, a HTTP reverse proxy and load balancer, had several issues related to vulnerabilities in the Secure Sockets Layer (SSL) protocol For Debian 7 (wheezy) this update adds a missing part to make it actually possible to disable client-initiated renegotiation and disables it by default (CVE-2009-3555) TLS compression is disabled (CVE-2012-4929), ...
A flaw was found in the way SSL 30 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data ...
Bodo Moller, Thai Duong and Krzysztof Kotowicz of Google discovered a flaw in the design of SSL version 30 that would allow an attacker to calculate the plaintext of secure connections, allowing, for example, secure HTTP cookies to be stolen googleonlinesecurityblogspotcom/2014/10/this-poodle-bites-exploiting-ssl-30htmlwwwopens ...
A flaw was found in the way SSL 30 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data ...
A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions (CVE-2014-6601) Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK An untrusted Java appli ...
A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions (CVE-2014-6601) Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK An untrusted Java appli ...
Multiple flaws were found in the way the Hotspot component in OpenJDK verified bytecode from the class files, and in the way this component generated code for bytecode An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions (CVE-2014-6601, CVE-2015-0437) Multiple improper permission check issues ...
A vulnerability in certain implementations of the TLSv1 protocol could allow an unauthenticated, remote attacker to access sensitive information The vulnerability is due to improper block cipher padding implemented in TLSv1 when using Cipher Block Chaining (CBC) mode An attacker could exploit the vulnerability to perform an "oracle padding" side ...
SSL 30 contains a flaw related to SSLv3 CBC-mode ciphers The issue is due to the block cipher padding not being deterministic and not covered by the MAC (Message Authentication Code) By sending a number of crafted requests to the server, an attacker can induce requests that will allow determining plaintext chunks of data When used in an automat ...
A potential security vulnerability has been identified with certain HP LaserJet Printers and MFPs, certain HP OfficeJet Printers and MFPs, and certain HP JetDirect Networking cards using OpenSSL This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE", which could be exploited remotely to allow disclo ...
A potential security vulnerability has been identified with certain HP LaserJet Printers and MFPs, certain HP OfficeJet Printers and MFPs, and certain HP JetDirect Networking cards using OpenSSL This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE", which could be exploited remotely to allow disclo ...
Description of Problem The recently disclosed protocol flaw in SSLv3, referred to as CVE-2014-3566 (cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2014-3566) or POODLE, could expose some deployments that support SSLv3 to a risk of an active Man in the Middle (MITM) attack A successful attack could lead to the disclosure of the information that ...
Description of Problem A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler-based hardware appliances: Citrix NetScaler Application Delivery Controller (ADC) Citrix NetScaler Gateway Citrix NetScaler Service Delivery Appliance Citrix CloudBridge (now NetScaler S ...

Exploits

Article discussing the SSL 30 fallback and POODLE vulnerabilities Proof of concept code included ...

Nmap Scripts

ssl-poodle

Checks whether SSLv3 CBC ciphers are allowed (POODLE)

nmap -sV --version-light --script ssl-poodle -p 443 <host>

PORT STATE SERVICE REASON 443/tcp open https syn-ack | ssl-poodle: | VULNERABLE: | SSL POODLE information leak | State: VULNERABLE | IDs: CVE:CVE-2014-3566 OSVDB:113251 | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and | other products, uses nondeterministic CBC padding, which makes it easier | for man-in-the-middle attackers to obtain cleartext data via a | padding-oracle attack, aka the "POODLE" issue. | Disclosure date: 2014-10-14 | Check results: | TLS_RSA_WITH_3DES_EDE_CBC_SHA | References: | https://www.imperialviolet.org/2014/10/14/poodle.html | http://osvdb.org/113251 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 |_ https://www.openssl.org/~bodo/ssl-poodle.pdf

Github Repositories

POODLE Attack Proof of Concept The Padding Oracle On Downgraded Legacy Encryption (POODLE) attack exploits a vulnerability in the SSL 30 protocol (CVE-2014-3566) This vulnerability allows an attacker to eavesdrop on communications encrypted using SSLv3 Although the vulnerability is no longer present in the Transport Layer Security (TLS) protocol, which is the successor to SS

PROJECT AUTHOR DATE MEASUREMENTS Daniel Kubec &lt;niel@rtfmcz&gt; June 2013 Network Measurements and Statistical Analysis This comprehensive system ensures that each measurements enable immediate and actionable insights, allowing users to discern the implications of the data and how it can be applied to enhance network security, performance, or compliance Abstr

Documentation Scanning for the target machine ip Note the target machine is a vulnerable machine for testing and educational purposes! Checking the subnet the machine is on ┌──(lamood㉿kali)-[~] └─$ ifconfig eth0: flags=4163&lt;UP,BROADCAST,RUNNING,MULTICAST&gt; mtu 1500 inet 19216864129 netmask 2552552550 broadcast 192168

Network-Vulnerability-Assessment-with-Nmap this project will be particularly useful for anyone who is using an M chip macbook, and using UTM as a VM Project Description This project aims to demonstrate the use of Nmap, a powerful network scanning tool, to identify vulnerabilities within a controlled environment using Metasploitable, a deliberately vulnerable virtual machine on

Test code for poodle attack

poodle-attack-sandbox Overview This code is the test code for POODLE(CVE-2014-3566) POODLE stands for "Padding Oracle On Downgraded Legacy Encryption" and is a vulnerability in SSLv30 Warning If you use this code to carry out an attack, you may be arrested by the judicial authorities of your country Use for study purposes only

Bouncer is a network TCP port redirector/forward proxy (like rinetd) with extra features like Reverse tunneling (like ssh -R), SSL tunneling (like stunnel), connection Failover, LoadBalancing and Clustering. In pure Java (BIO)

Bouncer (TCP) Bouncer is an open source (Apache License, Version 20) Java network proxy Do not require any external lib Current Stable Version is 2211 DOC Schema about Forward / Port Redirector (you need ONE bouncer): Machine-A (Client) init connection to Machine-B (Bouncer) Machine-B init connection to Machine-C (Server) Done: Machine-A is able to speak with Machine-C

CLI search tool for debian security tracker

Debsec Tool for searching the debian security tracker for a bunch of CVEs in bulk Usage May% echo CVE-2014-3566 &gt; /cves May% /debsec -distro wheezy-security &lt; cves 2015/03/20 17:20:06 WARNING: CVE-2014-3566 is open on wheezy-security for pkg gnutls26: security-trackerdebianorg/tracker/redirect/CVE-2014-3566 2015/03/20 17:20:06 WARNING: CVE-2014-3566 is

Backport to allow for the disabling of SSLv3 in the Debian Squeeze version of lighttpd

lighttpd POODLE for Debian Squeeze First Version (161) Patch to enable the of the ssluse-sslv3 config option to allow Debian Squeeze users to address CVE-2014-3566 (aka POODLE), without having to upgrade to Wheezy Created initially from a stripped down diff of vanilla lighttpd 1428 -&gt; 1429 Customised for the patchset already applied to 1428-2+squeeze16 apt-g

4PSA DNS Manager Patches Repository This repository contains a list of quick-fix patches that can be applied to DNS Manager The following table contains a description of the available patches: File Name Date Description sslpoodlefixsh 20141016 Fix SSLv3 vulnerability (CVE-2014-3566) in DNS Manager &gt;300

ric13351 VxWorks 61 FALLBACK_SCSV support for CVE-2014-3566

Test Poodle Exploit on a linux server using bash

froggPoodler Vulnerability POODLE CVE-2014-3566 this code is used to test Poodle vulnerability on SSL3 exploit, based on Dan Varga works (from redhat) script I made some change and now the Poodle vulnerability check is more clean for me =&gt; Script call : bash poodlesh {serverIP} {serverPort} info : serverIP and serverPort are optional =&gt; 20141017 - Frogg c

ric13351 VxWorks 61 Support for TLS_FALLBACK_SCSV for CVE-2014-3566 (POODLE)

VoipNow Patches Repository This repository contains a list of quick-fix patches that can be applied to VoipNow The following table contains a description of the available patches: File Name Date Description sslpoodlefixsh 20141016 Fix SSLv3 vulnerability (CVE-2014-3566) in VoipNow 2xx - 305

This module is an example profile to manage RHEL system configurations that comply with various regulations such as STIG, PCI, HIPAA, and more

About this Module This module is an example of how to use the System Integrity Monitoring Platform (SIMP) Puppet modules released by the National Security Agency (NSA) In addition to the example profile, an example Puppetfile and Hiera data are also provided Getting Started Adding the Modules This repository contains an example Puppetfile that can be used with Puppet Enterpri

Auto Remediation for Lacework Alerts with Kaholo

lacework-kaholo-autoremediation This repository is a collection of Kaholoio maps you can use as examples to automate the remediation of Lacework events and compliance reports What is Auto Remediation? Auto remediation is the concept to automate the response to events and alerts with automated steps that are able to fix or remediate underlying conditions and misconfigurations

Bouncer is a network TCP port redirector/forward proxy (like rinetd) with extra features like Reverse tunneling (like ssh -R), SSL tunneling (like stunnel), connection Failover, LoadBalancing and Clustering. In pure Java (BIO)

Bouncer (TCP) Bouncer is an open source (Apache License, Version 20) Java network proxy Do not require any external lib Current Stable Version is 2211 DOC fork from ggrandes/bouncer modify: modify bouncersh can run in AIX,modify date command modify bouncersh not need modify BOUNCER_HOME modify bouncersh can define JAVA_HOME Schema about Forward / Port Redirector (you

non-controlflow-hijacking-datasets Introduction The aim of this readme file is introducing a dataset for utilizing low-level hardware information to detect Non-Control-Flow hijacking attacks Multiple traditional techniques have been proposed to defend computing systems against malware attacks that hijack the control-flow of the victim program (control-oriented attacks) Howeve

Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566)

poodle_protector poodle_protectorpy is a Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566) It scans your Apache server configuration directories for unsecure configuration directives and ensures security by disabling SSL 20 and 30 It can also restart your server instantly after customizing the configuration Currently this

CVE-2014-3566-poodle This cookbook will error out your chef run if your server is vulnerable to CVE-2014-3566 Although this cookbook can be used to watch for failed chef runs, it is also a proof of concept Supported Platforms Ubuntu 1204 Centos-64 Attributes Key Type Description Default ['CVE-2014-3566-poodle']['ports']

Quick fix for AWS ELBs SSL Security Policy preventing POODLE issue with SSL vunerability

aws_poodle_fix Quick fix for AWS ELBs SSL Security Policy preventing POODLE issue with SSL vunerability ###requirements: boto api: $ pip install boto Reference: awsamazoncom/pt/security/security-bulletins/CVE-2014-3566-advisory/

Checking the Vulnerability in SSL V3 Proto

poodle_check Checking the Vulnerability in SSL V3 Proto Introduction On October 14th, 2014, a vulnerability in version 3 of the SSL encryption protocol was disclosed This vulnerability, dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption), allows an attacker to read information encrypted with this version of the protocol in plain text using a man-in-the-middle attack

Index Introduction to Information Security and Ethical Hacking Reconnaissance and Footprinting Scanning and Enumeration System Hacking Malwares Sniffing Social Engineering Evading IDS, Firewalls and Honeypots Denial of Service Session Hijacking Hacking Web Servers Hacking Web Applications Hacking Wireless Networks Hacking IoT and Mobile Platforms Pentesting Cloud Computing Cry

crypto vulnerabilities POODLE(Padding Oracle On Downgraded Legacy Encryption) In SSL 30 protocol, to encrypts plaintext message, it first creates a MAC and appends the MAC to the message(MAC-then-Encrypt) Padding is then added at the end to make the message an integral number of blocks in length Note that padding length is not covered by MAC Also content of padding is also

Vulnerability Checks heartbleedsh - CVE-2014-0160 poodlesh - CVE-2014-3566 freaksh - CVE-2015-0204

Download and run Dirk Wetter's testssl.sh on a list of url's and compile the failures into a single spreadsheet.

Test SSL Given a list of urls, run Dirk Wetter's testsslsh on each and tabulate failures only into a single spreadheet List of URLS to test These should be put in urlstxt on separate lines Run standalone /cloneRunAndAggregatesh The file results/failscsv will be generated Example If urlstxt consists of googlecom yahoocom m

Apache HTTP Server SHORTS security best practice

Setup Apache HTTP Server With Shorts Security Best Practice Apache HTTP Server is an older web server, and there are already numerous resources available on security hardening and best practices Despite the abundance of security hardening guides, many Apache HTTP Servers still suffer from security misconfigurations This document revisits the essential security configurations

MassBleed SSL Vulnerability Scanner

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range f

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range f

Nginx HTTP Server security best practice

Setup Nginx HTTP Server With Security Best Practice This document revisits the essential security configurations for Nginx HTTP Server from a practical perspective By following the key recommendations outlined below, you can avoid common configuration errors and prevent security vulnerabilities Table of Contents 1 Ensure Proper Permissions for Nginx Process Account 2 Ens

&lt;# SYNOPSIS Toggles cryptographic protocols (secure vs insecure) on the system Please test thoroughly in a non-production environment before deploying widely Make sure to run as Administrator or with appropriate privileges NOTES Author : Wayne Whye Date Created : 2025-01-26 Last Modified : 2025-01-26 Version : 10 CVEs : CVE-2014-356

CTF machine Writeup

VULNIX writeup nmap -p- Target_ip 2 nmap -sV -A —script vuln Target_ip root@v5ha1i:~# nmap -sV -A --script Vuln 192168122130 Starting Nmap 770 ( nmaporg ) at 2020-06-18 02:23 EDT Nmap scan report for 192168122130 Host is up (00017s latency) Not shown: 988 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 59p1 Debian

CTF machine Writeup

VULNIX writeup nmap -p- Target_ip 2 nmap -sV -A —script vuln Target_ip root@v5ha1i:~# nmap -sV -A --script Vuln 192168122130 Starting Nmap 770 ( nmaporg ) at 2020-06-18 02:23 EDT Nmap scan report for 192168122130 Host is up (00017s latency) Not shown: 988 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 59p1 Debian

Домашнее задание "Уязвимости и атаки на информационные системы" - Подус Сергей Задание 1 Скачайте и установите виртуальную машину Metasploitable: sourceforgenet/projects/metasploitable/ Это типовая ОС для экспериментов в о

References

CWE-310https://usn.ubuntu.com/2486-1/https://nvd.nist.govhttps://www.first.org/epssftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.aschttp://advisories.mageia.org/MGASA-2014-0416.htmlhttp://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.aschttp://archives.neohapsis.com/archives/bugtraq/2014-10/0101.htmlhttp://archives.neohapsis.com/archives/bugtraq/2014-10/0103.htmlhttp://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.htmlhttp://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspxhttp://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdfhttp://downloads.asterisk.org/pub/security/AST-2014-011.htmlhttp://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.htmlhttp://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlhttp://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.htmlhttp://marc.info/?l=bugtraq&m=141450452204552&w=2http://marc.info/?l=bugtraq&m=141450973807288&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141576815022399&w=2http://marc.info/?l=bugtraq&m=141577087123040&w=2http://marc.info/?l=bugtraq&m=141577350823734&w=2http://marc.info/?l=bugtraq&m=141620103726640&w=2http://marc.info/?l=bugtraq&m=141628688425177&w=2http://marc.info/?l=bugtraq&m=141694355519663&w=2http://marc.info/?l=bugtraq&m=141697638231025&w=2http://marc.info/?l=bugtraq&m=141697676231104&w=2http://marc.info/?l=bugtraq&m=141703183219781&w=2http://marc.info/?l=bugtraq&m=141715130023061&w=2http://marc.info/?l=bugtraq&m=141775427104070&w=2http://marc.info/?l=bugtraq&m=141813976718456&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142546741516006&w=2http://marc.info/?l=bugtraq&m=142607790919348&w=2http://marc.info/?l=bugtraq&m=142624590206005&w=2http://marc.info/?l=bugtraq&m=142624619906067http://marc.info/?l=bugtraq&m=142624619906067&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142791032306609&w=2http://marc.info/?l=bugtraq&m=142804214608580&w=2http://marc.info/?l=bugtraq&m=142805027510172&w=2http://marc.info/?l=bugtraq&m=142962817202793&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143290371927178&w=2http://marc.info/?l=bugtraq&m=143290437727362&w=2http://marc.info/?l=bugtraq&m=143290522027658&w=2http://marc.info/?l=bugtraq&m=143290583027876&w=2http://marc.info/?l=bugtraq&m=143558137709884&w=2http://marc.info/?l=bugtraq&m=143558192010071&w=2http://marc.info/?l=bugtraq&m=143628269912142&w=2http://marc.info/?l=bugtraq&m=144101915224472&w=2http://marc.info/?l=bugtraq&m=144251162130364&w=2http://marc.info/?l=bugtraq&m=144294141001552&w=2http://marc.info/?l=bugtraq&m=145983526810210&w=2http://marc.info/?l=openssl-dev&m=141333049205629&w=2http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1652.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1653.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1692.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1876.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1877.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1880.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1881.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1882.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1920.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1948.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0068.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0079.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0080.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0085.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0086.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0264.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0698.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1545.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1546.htmlhttp://secunia.com/advisories/59627http://secunia.com/advisories/60056http://secunia.com/advisories/60206http://secunia.com/advisories/60792http://secunia.com/advisories/60859http://secunia.com/advisories/61019http://secunia.com/advisories/61130http://secunia.com/advisories/61303http://secunia.com/advisories/61316http://secunia.com/advisories/61345http://secunia.com/advisories/61359http://secunia.com/advisories/61782http://secunia.com/advisories/61810http://secunia.com/advisories/61819http://secunia.com/advisories/61825http://secunia.com/advisories/61827http://secunia.com/advisories/61926http://secunia.com/advisories/61995http://support.apple.com/HT204244http://support.citrix.com/article/CTX200238http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodlehttp://www-01.ibm.com/support/docview.wss?uid=isg3T1021431http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439http://www-01.ibm.com/support/docview.wss?uid=swg21686997http://www-01.ibm.com/support/docview.wss?uid=swg21687172http://www-01.ibm.com/support/docview.wss?uid=swg21687611http://www-01.ibm.com/support/docview.wss?uid=swg21688283http://www-01.ibm.com/support/docview.wss?uid=swg21692299http://www.debian.org/security/2014/dsa-3053http://www.debian.org/security/2015/dsa-3144http://www.debian.org/security/2015/dsa-3147http://www.debian.org/security/2015/dsa-3253http://www.debian.org/security/2016/dsa-3489http://www.kb.cert.org/vuls/id/577193http://www.mandriva.com/security/advisories?name=MDVSA-2014:203http://www.mandriva.com/security/advisories?name=MDVSA-2015:062http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlhttp://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlhttp://www.securityfocus.com/archive/1/533724/100/0/threadedhttp://www.securityfocus.com/archive/1/533746http://www.securityfocus.com/archive/1/533747http://www.securityfocus.com/bid/70574http://www.securitytracker.com/id/1031029http://www.securitytracker.com/id/1031039http://www.securitytracker.com/id/1031085http://www.securitytracker.com/id/1031086http://www.securitytracker.com/id/1031087http://www.securitytracker.com/id/1031088http://www.securitytracker.com/id/1031089http://www.securitytracker.com/id/1031090http://www.securitytracker.com/id/1031091http://www.securitytracker.com/id/1031092http://www.securitytracker.com/id/1031093http://www.securitytracker.com/id/1031094http://www.securitytracker.com/id/1031095http://www.securitytracker.com/id/1031096http://www.securitytracker.com/id/1031105http://www.securitytracker.com/id/1031106http://www.securitytracker.com/id/1031107http://www.securitytracker.com/id/1031120http://www.securitytracker.com/id/1031123http://www.securitytracker.com/id/1031124http://www.securitytracker.com/id/1031130http://www.securitytracker.com/id/1031131http://www.securitytracker.com/id/1031132http://www.ubuntu.com/usn/USN-2486-1http://www.ubuntu.com/usn/USN-2487-1http://www.us-cert.gov/ncas/alerts/TA14-290Ahttp://www.vmware.com/security/advisories/VMSA-2015-0003.htmlhttp://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htmhttps://access.redhat.com/articles/1232123https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6https://bto.bluecoat.com/security-advisory/sa83https://bugzilla.mozilla.org/show_bug.cgi?id=1076983https://bugzilla.redhat.com/show_bug.cgi?id=1152789https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-iphttps://github.com/mpgn/poodle-PoChttps://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJUhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02https://kc.mcafee.com/corporate/index?page=content&id=SB10090https://kc.mcafee.com/corporate/index?page=content&id=SB10091https://kc.mcafee.com/corporate/index?page=content&id=SB10104https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3Ehttps://puppet.com/security/cve/poodle-sslv3-vulnerabilityhttps://security.gentoo.org/glsa/201507-14https://security.gentoo.org/glsa/201606-11https://security.netapp.com/advisory/ntap-20141015-0001/https://support.apple.com/HT205217https://support.apple.com/kb/HT6527https://support.apple.com/kb/HT6529https://support.apple.com/kb/HT6531https://support.apple.com/kb/HT6535https://support.apple.com/kb/HT6536https://support.apple.com/kb/HT6541https://support.apple.com/kb/HT6542https://support.citrix.com/article/CTX216642https://support.lenovo.com/product_security/poodlehttps://support.lenovo.com/us/en/product_security/poodlehttps://technet.microsoft.com/library/security/3009008.aspxhttps://www-01.ibm.com/support/docview.wss?uid=swg21688165https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.htmlhttps://www.dfranke.us/posts/2014-10-14-how-poodle-happened.htmlhttps://www.elastic.co/blog/logstash-1-4-3-releasedhttps://www.imperialviolet.org/2014/10/14/poodle.htmlhttps://www.openssl.org/news/secadv_20141015.txthttps://www.openssl.org/~bodo/ssl-poodle.pdfhttps://www.suse.com/support/kb/doc.php?id=7015773ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.aschttp://advisories.mageia.org/MGASA-2014-0416.htmlhttp://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.aschttp://archives.neohapsis.com/archives/bugtraq/2014-10/0101.htmlhttp://archives.neohapsis.com/archives/bugtraq/2014-10/0103.htmlhttp://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.htmlhttp://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspxhttp://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdfhttp://downloads.asterisk.org/pub/security/AST-2014-011.htmlhttp://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.htmlhttp://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlhttp://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.htmlhttp://marc.info/?l=bugtraq&m=141450452204552&w=2http://marc.info/?l=bugtraq&m=141450973807288&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141477196830952&w=2http://marc.info/?l=bugtraq&m=141576815022399&w=2http://marc.info/?l=bugtraq&m=141577087123040&w=2http://marc.info/?l=bugtraq&m=141577350823734&w=2http://marc.info/?l=bugtraq&m=141620103726640&w=2http://marc.info/?l=bugtraq&m=141628688425177&w=2http://marc.info/?l=bugtraq&m=141694355519663&w=2http://marc.info/?l=bugtraq&m=141697638231025&w=2http://marc.info/?l=bugtraq&m=141697676231104&w=2http://marc.info/?l=bugtraq&m=141703183219781&w=2http://marc.info/?l=bugtraq&m=141715130023061&w=2http://marc.info/?l=bugtraq&m=141775427104070&w=2http://marc.info/?l=bugtraq&m=141813976718456&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141814011518700&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=141879378918327&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142296755107581&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350196615714&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350298616097&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142350743917559&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142354438527235&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142357976805598&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142496355704097&w=2http://marc.info/?l=bugtraq&m=142546741516006&w=2http://marc.info/?l=bugtraq&m=142607790919348&w=2http://marc.info/?l=bugtraq&m=142624590206005&w=2http://marc.info/?l=bugtraq&m=142624619906067http://marc.info/?l=bugtraq&m=142624619906067&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624679706236&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142624719706349&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721830231196&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142721887231400&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142740155824959&w=2http://marc.info/?l=bugtraq&m=142791032306609&w=2http://marc.info/?l=bugtraq&m=142804214608580&w=2http://marc.info/?l=bugtraq&m=142805027510172&w=2http://marc.info/?l=bugtraq&m=142962817202793&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143039249603103&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143101048219218&w=2http://marc.info/?l=bugtraq&m=143290371927178&w=2http://marc.info/?l=bugtraq&m=143290437727362&w=2http://marc.info/?l=bugtraq&m=143290522027658&w=2http://marc.info/?l=bugtraq&m=143290583027876&w=2http://marc.info/?l=bugtraq&m=143558137709884&w=2http://marc.info/?l=bugtraq&m=143558192010071&w=2http://marc.info/?l=bugtraq&m=143628269912142&w=2http://marc.info/?l=bugtraq&m=144101915224472&w=2http://marc.info/?l=bugtraq&m=144251162130364&w=2http://marc.info/?l=bugtraq&m=144294141001552&w=2http://marc.info/?l=bugtraq&m=145983526810210&w=2http://marc.info/?l=openssl-dev&m=141333049205629&w=2http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1652.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1653.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1692.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1876.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1877.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1880.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1881.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1882.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1920.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1948.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0068.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0079.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0080.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0085.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0086.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0264.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0698.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1545.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1546.htmlhttp://secunia.com/advisories/59627http://secunia.com/advisories/60056http://secunia.com/advisories/60206http://secunia.com/advisories/60792http://secunia.com/advisories/60859http://secunia.com/advisories/61019http://secunia.com/advisories/61130http://secunia.com/advisories/61303http://secunia.com/advisories/61316http://secunia.com/advisories/61345http://secunia.com/advisories/61359http://secunia.com/advisories/61782http://secunia.com/advisories/61810http://secunia.com/advisories/61819http://secunia.com/advisories/61825http://secunia.com/advisories/61827http://secunia.com/advisories/61926http://secunia.com/advisories/61995http://support.apple.com/HT204244http://support.citrix.com/article/CTX200238http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodlehttp://www-01.ibm.com/support/docview.wss?uid=isg3T1021431http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439http://www-01.ibm.com/support/docview.wss?uid=swg21686997http://www-01.ibm.com/support/docview.wss?uid=swg21687172http://www-01.ibm.com/support/docview.wss?uid=swg21687611http://www-01.ibm.com/support/docview.wss?uid=swg21688283http://www-01.ibm.com/support/docview.wss?uid=swg21692299http://www.debian.org/security/2014/dsa-3053http://www.debian.org/security/2015/dsa-3144http://www.debian.org/security/2015/dsa-3147http://www.debian.org/security/2015/dsa-3253http://www.debian.org/security/2016/dsa-3489http://www.kb.cert.org/vuls/id/577193http://www.mandriva.com/security/advisories?name=MDVSA-2014:203http://www.mandriva.com/security/advisories?name=MDVSA-2015:062http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlhttp://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlhttp://www.securityfocus.com/archive/1/533724/100/0/threadedhttp://www.securityfocus.com/archive/1/533746http://www.securityfocus.com/archive/1/533747http://www.securityfocus.com/bid/70574http://www.securitytracker.com/id/1031029http://www.securitytracker.com/id/1031039http://www.securitytracker.com/id/1031085http://www.securitytracker.com/id/1031086http://www.securitytracker.com/id/1031087http://www.securitytracker.com/id/1031088http://www.securitytracker.com/id/1031089http://www.securitytracker.com/id/1031090http://www.securitytracker.com/id/1031091http://www.securitytracker.com/id/1031092http://www.securitytracker.com/id/1031093http://www.securitytracker.com/id/1031094http://www.securitytracker.com/id/1031095http://www.securitytracker.com/id/1031096http://www.securitytracker.com/id/1031105http://www.securitytracker.com/id/1031106http://www.securitytracker.com/id/1031107http://www.securitytracker.com/id/1031120http://www.securitytracker.com/id/1031123http://www.securitytracker.com/id/1031124http://www.securitytracker.com/id/1031130http://www.securitytracker.com/id/1031131http://www.securitytracker.com/id/1031132http://www.ubuntu.com/usn/USN-2486-1http://www.ubuntu.com/usn/USN-2487-1http://www.us-cert.gov/ncas/alerts/TA14-290Ahttp://www.vmware.com/security/advisories/VMSA-2015-0003.htmlhttp://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htmhttps://access.redhat.com/articles/1232123https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6https://bto.bluecoat.com/security-advisory/sa83https://bugzilla.mozilla.org/show_bug.cgi?id=1076983https://bugzilla.redhat.com/show_bug.cgi?id=1152789https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-iphttps://github.com/mpgn/poodle-PoChttps://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJUhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02https://kc.mcafee.com/corporate/index?page=content&id=SB10090https://kc.mcafee.com/corporate/index?page=content&id=SB10091https://kc.mcafee.com/corporate/index?page=content&id=SB10104https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3Ehttps://puppet.com/security/cve/poodle-sslv3-vulnerabilityhttps://security.gentoo.org/glsa/201507-14https://security.gentoo.org/glsa/201606-11https://security.netapp.com/advisory/ntap-20141015-0001/https://support.apple.com/HT205217https://support.apple.com/kb/HT6527https://support.apple.com/kb/HT6529https://support.apple.com/kb/HT6531https://support.apple.com/kb/HT6535https://support.apple.com/kb/HT6536https://support.apple.com/kb/HT6541https://support.apple.com/kb/HT6542https://support.citrix.com/article/CTX216642https://support.lenovo.com/product_security/poodlehttps://support.lenovo.com/us/en/product_security/poodlehttps://technet.microsoft.com/library/security/3009008.aspxhttps://templatelab.com/ssl-poodle/https://www-01.ibm.com/support/docview.wss?uid=swg21688165https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.htmlhttps://www.dfranke.us/posts/2014-10-14-how-poodle-happened.htmlhttps://www.elastic.co/blog/logstash-1-4-3-releasedhttps://www.imperialviolet.org/2014/10/14/poodle.htmlhttps://www.openssl.org/news/secadv_20141015.txthttps://www.openssl.org/~bodo/ssl-poodle.pdfhttps://www.suse.com/support/kb/doc.php?id=7015773