3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.975 High
EPSS
Percentile
100.0%
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products,
uses nondeterministic CBC padding, which makes it easier for
man-in-the-middle attackers to obtain cleartext data via a padding-oracle
attack, aka the “POODLE” issue.
Author | Note |
---|---|
mdeslaur | We recommend disabling SSLv3 on servers, if possible. Community-provided information on disabling SSLv3 can be found here: http://askubuntu.com/a/537196 SANS provided information on disabling SSLv3 can be found here: https://isc.sans.edu/forums/diary/POODLE+Turning+off+SSLv3+for+various+servers+and+client+/18837 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | openjdk-6 | < 6b34-1.13.6-1ubuntu0.10.04.1 | UNKNOWN |
ubuntu | 12.04 | noarch | openjdk-6 | < 6b34-1.13.6-1ubuntu0.12.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | openjdk-6 | < 6b34-1.13.6-1ubuntu0.14.04.1 | UNKNOWN |
ubuntu | 14.10 | noarch | openjdk-6 | < 6b34-1.13.6-1ubuntu0.14.10.1 | UNKNOWN |
ubuntu | 12.04 | noarch | openjdk-7 | < 7u75-2.5.4-1~precise1 | UNKNOWN |
ubuntu | 14.04 | noarch | openjdk-7 | < 7u75-2.5.4-1~trusty1 | UNKNOWN |
ubuntu | 14.10 | noarch | openjdk-7 | < 7u75-2.5.4-1~utopic1 | UNKNOWN |
ubuntu | 17.10 | noarch | openssl | < 1.0.1f-1ubuntu9 | UNKNOWN |
ubuntu | 18.04 | noarch | openssl | < 1.0.1f-1ubuntu9 | UNKNOWN |
ubuntu | 18.10 | noarch | openssl | < 1.0.1f-1ubuntu9 | UNKNOWN |
askubuntu.com/a/537196
marc.info/?l=openssl-dev&m=141333049205629&w=2
blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
launchpad.net/bugs/cve/CVE-2014-3566
nvd.nist.gov/vuln/detail/CVE-2014-3566
security-tracker.debian.org/tracker/CVE-2014-3566
ubuntu.com/security/notices/USN-2486-1
ubuntu.com/security/notices/USN-2487-1
www.cve.org/CVERecord?id=CVE-2014-3566
www.imperialviolet.org/2014/10/14/poodle.html
www.openssl.org/news/secadv_20141015.txt
www.openssl.org/~bodo/ssl-poodle.pdf
3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.975 High
EPSS
Percentile
100.0%