SSL 3.0 POODLE attack information leakage Vulnerability (CVE-2014-3566)

Source: Internet
Author: User
Tags ssl connection

SSL 3.0 POODLE attack information leakage Vulnerability (CVE-2014-3566)

Release date:
Updated on:

Affected Systems:
Netscape ssl 3.0
Netscape tls
Unaffected system:
Netscape tls 1.2
Netscape tls 1.1
Netscape tls 1.0
Description:
CVE (CAN) ID: CVE-2014-3566

SSL3.0 is an out-of-date and insecure protocol and has been replaced by TLS 1.0, TLS 1.1, and TLS 1.2. Due to compatibility, most TLS implementations are still compatible with SSL3.0.

For the sake of universality, most browsers currently support SSL3.0. The handshake phase of the TLS Protocol includes version negotiation steps. Generally, the latest Protocol version on the client and server will be used. During the version negotiation with the server, the system first provides the latest version of the supported Protocol. If the handshake fails, it tries to negotiate with the earlier Protocol version. Attackers who are able to launch man-in-the-middle attacks can successfully launch a Downgrade Attack by failing to connect the affected browsers to the server through negotiation with newer protocols, in this way, the client and the server use insecure SSL3.0 for communication. At this time, due to the vulnerability in the implementation of CBC block encryption used by SSL 3.0, attackers can successfully crack the encrypted information of the SSL connection, for example, obtain user cookie data. This attack is called a POODL attack (Padding Oracle On Downgraded Legacy Encryption ).

This vulnerability affects the vast majority of SSL servers and clients and has a wide impact. However, if an attacker wants to exploit this vulnerability, the attacker must be able to control the data between the client and the server (execute man-in-the-middle attacks ).

How to fix pow.sslv3 Security Vulnerabilities (CVE-2014-3566)

<* Source: Bodo M & #246; Roller
Thai Duong
Krzysztof Kotowicz

Link: https://www.openssl.org /~ Bodo/ssl-poodle.pdf
Https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
Blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
*>

Suggestion:
Temporary solution:

If you cannot install or upgrade the patch immediately, NSFOCUS recommends that you take the following measures to reduce the threat:

* Disable the SSL 3.0 protocol.

Currently, only Internet Explorer 6.0 does not support TLS 1.0. disabling SSL 3.0 affects Internet Explorer 6.
SSL access.

Server disabling method:

Apache 2.x:
In the mod_ssl configuration file, use the following command to disable SSLv2 and SSLv3:
SSLProtocol All-SSLv2-SSLv3
Restart Apache

Nginx:
Use the following in the configuration file:
Ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
Restart Nginx

IIS:
Find the following registry key:
HKey_Local_Machine \ System \ CurrentControlSet \ Control \ SecurityProviders \ SCHANNEL \ Protocols
This registry key usually contains the following subitems:
* PCT 1.0
* The SSL 2.0
* The SSL 3.0
* TLS 1.0
Each registry entry retains the protocol-related information that applies to this entry. You can disable any of these protocols on the server. To this end,
Create a New DWORD Value in the server subitem of SSL 3.0. Set the DWORD Value to "00 00 00 ".

How to disable the browser:

IE:
"Tools"-> "Internet Options"-> "advanced", deselect the "use SSL 3.0" check box.

Chrome:

Copy a shortcut that usually opens the Chrome browser, right-click the new shortcut, and enter properties,
Enter the following command at the end of the field in the space after "target" -- ssl-version-min = tls1

FireFox:

Enter "about: config" in the address bar, and then adjust security. tls. version. min to 1.

Vendor patch:

Netscape
--------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:

Refer:

Https://www.openssl.org /~ Bodo/ssl-poodle.pdf
Http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
Https://technet.microsoft.com/en-us/library/security/3009008

This article permanently updates the link address:

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.