Originally Published at SaurzCode :- [http://saurzcode.in/2014/12/poodle-vulnerability-affects/]
What is POODLE?
It stands for “Padding Oracle On Downgraded Legacy Encryption.”.This means a protocol downgrade that allows exploits on an outdated form of encryption.It was first explained in Google Security Advisory.
![Poodle](http://saurzcode.in/wp-content/uploads/2014/12/Poodle-199x300.jpg)
The POODLE attack can be used against any system or application that supports SSL 3.0 with CBC mode ciphers. This affects most current browsers and websites, but also includes any software that either references a vulnerable SSL/TLS library (e.g. OpenSSL) or implements the SSL/TLS protocol suite itself. By exploiting this vulnerability in a likely web-based scenario, an attacker can gain access to sensitive data passed within the encrypted web session, such as passwords, cookies and other authentication tokens that can then be used to gain more complete access to a website (impersonating that user, accessing database content, etc.)
How Can We Solve the Problem?
As a user, you want to protect yourself from attacks, and the best way to do that is to disable SSL 3 in your browser. As a web site operator, you should disable SSL 3 on your servers as soon as possible. You need to do this even if you support the most recent TLS version because an active MITM attacker can force browsers to downgrade their connections all the way down to SSL 3, which can then be exploited
Microsoft Advisory -
https://technet.microsoft.com/en-us/library/security/3009008.aspx
References
- [1] This Poodle Bites: Exploiting The SSL Fallback
- [2] OpenSSL Security Advisory [15 Oct 2014]
- [3] Vulnerability Summary for CVE-2014-3566
- [4] CERT Vulnerability Note VU#577193
- [5] How to Geek :Poodle
Also take a look at :- - More Effective Java with Joshua Bloch
- How to generate Restful API Doc using Swagger.
No comments:
Post a Comment