CVE-2014-3566

Severity

34%

Complexity

16%

Confidentiality

23%

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

CVSS 3.1 Base Score 3.4. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).

Overview

First reported 10 years ago

2014-10-15 00:55:00

Last updated 4 years ago

2020-04-01 11:15:00

Affected Software

Red Hat Enterprise Linux 5

5

Red Hat Enterprise Linux Desktop 6.0

6.0

RedHat Enterprise Linux Desktop 7.0

7.0

Red Hat Enterprise Linux Desktop Supplementary 5.0

5.0

Red Hat Enterprise Linux Desktop Supplementary 6.0 (v. 6)

6.0

Red Hat Enterprise Linux Server 6.0

6.0

RedHat Enterprise Linux Server 7.0

7.0

Red Hat Enterprise Linux Server Supplementary 5.0

5.0

Red Hat Enterprise Linux Server Supplementary 6.0 (v. 6)

6.0

Red Hat Enterprise Linux Workstation 6.0

6.0

RedHat Enterprise Linux Workstation 7.0

7.0

Red Hat Enterprise Linux Workstation Supplementary 6.0 (v. 6)

6.0

IBM AIX 5.3

5.3

IBM AIX 6.1

6.1

IBM AIX 7.1

7.1

Apple Mac OS X

Mageia 3.0

3.0

Mageia 4.0

4.0

Novell Suse Linux Enterprise Desktop 9.0

9.0

Novell Suse Linux Enterprise Desktop 10.0

10.0

Novell SUSE Linux Enterprise Desktop 12.0

12.0

Novell SUSE Linux Enterprise Server 11.0 Service Pack 3

11.0

Novell Suse Linux Enterprise Server 11.0 Service Pack 3 for VMware

11.0
vmware

Novell SUSE Linux Enterprise Server 12.0

12.0

Novell Suse Linux Enterprise Software Development Kit 11.0 Service Pack 3

11.0

OpenSUSE 12.3

12.3

OpenSUSE 13.1

13.1

Fedora 19

19

Fedora 20

20

Fedora 21

21

OpenSSL Project OpenSSL 0.9.8

0.9.8

OpenSSL Project OpenSSL 0.9.8a

0.9.8a

OpenSSL Project OpenSSL 0.9.8b

0.9.8b

OpenSSL Project OpenSSL 0.9.8c

0.9.8c

OpenSSL Project OpenSSL 0.9.8d

0.9.8d

OpenSSL Project OpenSSL 0.9.8e

0.9.8e

OpenSSL Project OpenSSL 0.9.8f

0.9.8f

OpenSSL Project OpenSSL 0.9.8g

0.9.8g

OpenSSL Project OpenSSL 0.9.8h

0.9.8h

OpenSSL Project OpenSSL 0.9.8i

0.9.8i

OpenSSL Project OpenSSL 0.9.8j

0.9.8j

OpenSSL Project OpenSSL 0.9.8k

0.9.8k

OpenSSL Project OpenSSL 0.9.8l

0.9.8l

OpenSSL Project OpenSSL 0.9.8m

0.9.8m

OpenSSL Project OpenSSL 0.9.8m Beta1

0.9.8m

OpenSSL Project OpenSSL 0.9.8n

0.9.8n

OpenSSL Project OpenSSL 0.9.8o

0.9.8o

OpenSSL Project OpenSSL 0.9.8p

0.9.8p

OpenSSL Project OpenSSL 0.9.8q

0.9.8q

OpenSSL Project OpenSSL 0.9.8r

0.9.8r

OpenSSL Project OpenSSL 0.9.8s

0.9.8s

OpenSSL Project OpenSSL 0.9.8t

0.9.8t

OpenSSL Project OpenSSL 0.9.8u

0.9.8u

OpenSSL Project OpenSSL 0.9.8v

0.9.8v

OpenSSL Project OpenSSL 0.9.8w

0.9.8w

OpenSSL Project OpenSSL 0.9.8x

0.9.8x

OpenSSL Project OpenSSL 0.9.8y

0.9.8y

OpenSSL Project OpenSSL 0.9.8z

0.9.8z

OpenSSL Project OpenSSL 0.9.8za

0.9.8za

OpenSSL Project OpenSSL 0.9.8zb

0.9.8zb

OpenSSL Project OpenSSL 1.0.0

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta1

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta2

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta3

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta4

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta5

1.0.0

OpenSSL Project OpenSSL 1.0.0a

1.0.0a

OpenSSL Project OpenSSL 1.0.0b

1.0.0b

OpenSSL Project OpenSSL 1.0.0c

1.0.0c

OpenSSL Project OpenSSL 1.0.0d

1.0.0d

OpenSSL Project OpenSSL 1.0.0e

1.0.0e

OpenSSL Project OpenSSL 1.0.0f

1.0.0f

OpenSSL Project OpenSSL 1.0.0g

1.0.0g

OpenSSL Project OpenSSL 1.0.0h

1.0.0h

OpenSSL Project OpenSSL 1.0.0i

1.0.0i

OpenSSL Project OpenSSL 1.0.0j

1.0.0j

OpenSSL Project OpenSSL 1.0.0k

1.0.0k

OpenSSL Project OpenSSL 1.0.0l

1.0.0l

OpenSSL Project OpenSSL 1.0.0m

1.0.0m

OpenSSL Project OpenSSL 1.0.0n

1.0.0n

OpenSSL Project OpenSSL 1.0.1

1.0.1

OpenSSL Project OpenSSL 1.0.1 Beta1

1.0.1

OpenSSL Project OpenSSL 1.0.1 Beta2

1.0.1

OpenSSL Project OpenSSL 1.0.1 Beta3

1.0.1

OpenSSL Project OpenSSL 1.0.1a

1.0.1a

OpenSSL Project OpenSSL 1.0.1b

1.0.1b

OpenSSL Project OpenSSL 1.0.1c

1.0.1c

OpenSSL Project OpenSSL 1.0.1d

1.0.1d

OpenSSL Project OpenSSL 1.0.1e

1.0.1e

OpenSSL Project OpenSSL 1.0.1f

1.0.1f

OpenSSL Project OpenSSL 1.0.1g

1.0.1g

OpenSSL Project OpenSSL 1.0.1h

1.0.1h

OpenSSL Project OpenSSL 1.0.1i

1.0.1i

IBM VIOS 2.2.0.10

2.2.0.10

IBM VIOS 2.2.0.11

2.2.0.11

IBM VIOS 2.2.0.12

2.2.0.12

IBM VIOS 2.2.0.13

2.2.0.13

IBM VIOS 2.2.1.0

2.2.1.0

IBM VIOS 2.2.1.1

2.2.1.1

IBM VIOS 2.2.1.3

2.2.1.3

IBM VIOS 2.2.1.4

2.2.1.4

IBM Virtual I/O Server (VIOS) 2.2.1.5

2.2.1.5

IBM Virtual I/O Server (VIOS) 2.2.1.6

2.2.1.6

IBM Virtual I/O Server (VIOS) 2.2.1.7

2.2.1.7

IBM VIOS 2.2.1.8

2.2.1.8

IBM VIOS 2.2.1.9

2.2.1.9

IBM VIOS 2.2.2.0

2.2.2.0

IBM Virtual I/O Server (VIOS) 2.2.2.1

2.2.2.1

IBM Virtual I/O Server (VIOS) 2.2.2.2

2.2.2.2

IBM Virtual I/O Server (VIOS) 2.2.2.3

2.2.2.3

IBM VIOS 2.2.2.4

2.2.2.4

IBM VIOS 2.2.2.5

2.2.2.5

IBM VIOS 2.2.3.0

2.2.3.0

IBM Virtual I/O Server (VIOS) 2.2.3.1

2.2.3.1

IBM VIOS 2.2.3.2

2.2.3.2

IBM VIOS 2.2.3.3

2.2.3.3

IBM Virtual I/O Server (VIOS) 2.2.3.4

2.2.3.4

NetBSD 5.1

5.1

NetBSD 5.1.1

5.1.1

NetBSD 5.1.2

5.1.2

NetBSD 5.1.3

5.1.3

NetBSD 5.1.4

5.1.4

NetBSD 5.2

5.2

NetBSD 5.2.1

5.2.1

NetBSD 5.2.2

5.2.2

NetBSD 6.0

6.0

NetBSD 6.0 Beta

6.0

NetBSD 6.0.1

6.0.1

NetBSD 6.0.2

6.0.2

NetBSD 6.0.3

6.0.3

NetBSD 6.0.4

6.0.4

NetBSD 6.0.5

6.0.5

NetBSD 6.0.6

6.0.6

NetBSD 6.1

6.1

NetBSD 6.1.1

6.1.1

NetBSD 6.1.2

6.1.2

NetBSD 6.1.3

6.1.3

NetBSD 6.1.4

6.1.4

NetBSD 6.1.5

6.1.5

Debian Linux 7.0

7.0

Debian Linux 8.0 (Jessie)

8.0

Oracle Database 11.2.0.4

11.2.0.4

Oracle Database 12.1.0.2

12.1.0.2

References

NetBSD-SA2014-015

Third Party Advisory

http://advisories.mageia.org/MGASA-2014-0416.html

Third Party Advisory

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc

Third Party Advisory

APPLE-SA-2014-10-16-1

Third Party Advisory

APPLE-SA-2014-10-16-3

Third Party Advisory

http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566

Third Party Advisory

http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html

Third Party Advisory

http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/

Third Party Advisory

http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx

Third Party Advisory

http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf

Third Party Advisory

http://downloads.asterisk.org/pub/security/AST-2014-011.html

Third Party Advisory

http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html

Third Party Advisory

HPSBUX03281

Third Party Advisory

http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034

Third Party Advisory

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

Third Party Advisory

APPLE-SA-2015-01-27-4

Mailing List, Third Party Advisory

APPLE-SA-2015-09-16-2

Mailing List, Third Party Advisory

FEDORA-2014-12951

Third Party Advisory

FEDORA-2014-13069

Third Party Advisory

FEDORA-2014-13012

Third Party Advisory

FEDORA-2015-9110

Third Party Advisory

FEDORA-2015-9090

Third Party Advisory

openSUSE-SU-2014:1331

Third Party Advisory

SUSE-SU-2014:1357

Third Party Advisory

SUSE-SU-2014:1361

Third Party Advisory

SUSE-SU-2014:1526

Third Party Advisory

SUSE-SU-2014:1549

Third Party Advisory

openSUSE-SU-2015:0190

Third Party Advisory

SUSE-SU-2015:0336

Third Party Advisory

SUSE-SU-2015:0344

Third Party Advisory

SUSE-SU-2015:0345

Third Party Advisory

SUSE-SU-2015:0376

Third Party Advisory

SUSE-SU-2015:0392

Third Party Advisory

SUSE-SU-2015:0503

Third Party Advisory

SUSE-SU-2015:0578

Third Party Advisory

openSUSE-SU-2016:0640

Third Party Advisory

SUSE-SU-2016:1457

Third Party Advisory

SUSE-SU-2016:1459

Third Party Advisory

HPSBMU03152

Third Party Advisory

HPSBHF03156

Third Party Advisory

HPSBUX03162

Third Party Advisory

HPSBGN03191

Third Party Advisory

HPSBMU03184

Third Party Advisory

HPSBGN03164

Third Party Advisory

HPSBGN03192

Third Party Advisory

HPSBMU03183

Third Party Advisory

HPSBMU03214

Third Party Advisory

HPSBGN03201

Third Party Advisory

HPSBGN03203

Third Party Advisory

HPSBGN03202

Third Party Advisory

HPSBGN03209

Third Party Advisory

HPSBGN03205

Third Party Advisory

HPSBGN03222

Third Party Advisory

SSRT101838

Third Party Advisory

SSRT101849

Third Party Advisory

HPSBOV03227

Third Party Advisory

SSRT101868

Third Party Advisory

SSRT101854

Third Party Advisory

SSRT101897

Third Party Advisory

SSRT101898

Third Party Advisory

SSRT101896

Third Party Advisory

HPSBGN03251

Third Party Advisory

HPSBGN03255

Third Party Advisory

HPSBMU03260

Third Party Advisory

SSRT101951

Third Party Advisory

HPSBST03265

Third Party Advisory

SSRT101968

Third Party Advisory

HPSBMU03267

Third Party Advisory

SSRT101922

Third Party Advisory

HPSBMU03259

Third Party Advisory

HPSBMU03283

Third Party Advisory

SSRT101921

Third Party Advisory

SSRT101846

Third Party Advisory

HPSBMU03301

Third Party Advisory

SSRT101790

Third Party Advisory

SSRT101795

Third Party Advisory

HPSBMU03304

Third Party Advisory

HPSBHF03300

Third Party Advisory

HPSBST03195

Third Party Advisory

HPSBGN03305

Third Party Advisory

HPSBMU03241

Third Party Advisory

HPSBUX03194

Third Party Advisory

HPSBGN03332

Third Party Advisory

HPSBMU03263

Third Party Advisory

HPSBMU03261

Third Party Advisory

HPSBMU03223

Third Party Advisory

HPSBPI03107

Third Party Advisory

HPSBPI03360

Third Party Advisory

HPSBMU03234

Third Party Advisory

HPSBMU03416

Third Party Advisory

HPSBST03418

Third Party Advisory

HPSBGN03391

Third Party Advisory

HPSBGN03569

Third Party Advisory

[openssl-dev] 20141014 Patch to mitigate CVE-2014-3566 ("POODLE")

Third Party Advisory

http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html

Third Party Advisory

RHSA-2014:1652

Third Party Advisory

RHSA-2014:1653

Third Party Advisory

RHSA-2014:1692

Third Party Advisory

RHSA-2014:1876

Third Party Advisory

RHSA-2014:1877

Third Party Advisory

RHSA-2014:1880

Third Party Advisory

RHSA-2014:1881

Third Party Advisory

RHSA-2014:1882

Third Party Advisory

RHSA-2014:1920

Third Party Advisory

RHSA-2014:1948

Third Party Advisory

RHSA-2015:0068

Third Party Advisory

RHSA-2015:0079

Third Party Advisory

RHSA-2015:0080

Third Party Advisory

RHSA-2015:0085

Third Party Advisory

RHSA-2015:0086

Third Party Advisory

RHSA-2015:0264

Third Party Advisory

RHSA-2015:0698

Third Party Advisory

RHSA-2015:1545

Third Party Advisory

RHSA-2015:1546

Third Party Advisory

59627

Third Party Advisory

60056

Third Party Advisory

60206

Third Party Advisory

60792

Third Party Advisory

60859

Third Party Advisory

61019

Third Party Advisory

61130

Third Party Advisory

61303

Third Party Advisory

61316

Third Party Advisory

61345

Third Party Advisory

61359

Third Party Advisory

61782

Third Party Advisory

61810

Third Party Advisory

61819

Third Party Advisory

61825

Third Party Advisory

61827

Third Party Advisory

61926

Third Party Advisory

61995

Third Party Advisory

http://support.apple.com/HT204244

Third Party Advisory

http://support.citrix.com/article/CTX200238

Third Party Advisory

20141014 SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability

Third Party Advisory

DSA-3053

Third Party Advisory

DSA-3144

Third Party Advisory

DSA-3147

Third Party Advisory

DSA-3253

Third Party Advisory

DSA-3489

Third Party Advisory

VU#577193

Third Party Advisory, US Government Resource

MDVSA-2014:203

Third Party Advisory

MDVSA-2015:062

Third Party Advisory

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Patch, Third Party Advisory

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Patch, Third Party Advisory

http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Patch, Third Party Advisory

http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Third Party Advisory

http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Third Party Advisory

APPLE-SA-2014-10-16-4

Third Party Advisory, VDB Entry

APPLE-SA-2014-10-20-2

Third Party Advisory, VDB Entry

APPLE-SA-2014-10-20-1

Third Party Advisory, VDB Entry

70574

Third Party Advisory, VDB Entry

1031029

Third Party Advisory, VDB Entry

1031039

Third Party Advisory, VDB Entry

1031085

Third Party Advisory, VDB Entry

1031086

Third Party Advisory, VDB Entry

1031087

Third Party Advisory, VDB Entry

1031088

Third Party Advisory, VDB Entry

1031089

Third Party Advisory, VDB Entry

1031090

Third Party Advisory, VDB Entry

1031091

Third Party Advisory, VDB Entry

1031092

Third Party Advisory, VDB Entry

1031093

Third Party Advisory, VDB Entry

1031094

Third Party Advisory, VDB Entry

1031095

Third Party Advisory, VDB Entry

1031096

Third Party Advisory, VDB Entry

1031105

Third Party Advisory, VDB Entry

1031106

Third Party Advisory, VDB Entry

1031107

Third Party Advisory, VDB Entry

1031120

Third Party Advisory, VDB Entry

1031123

Third Party Advisory, VDB Entry

1031124

Third Party Advisory, VDB Entry

1031130

Third Party Advisory, VDB Entry

1031131

Third Party Advisory, VDB Entry

1031132

Third Party Advisory, VDB Entry

USN-2486-1

Vendor Advisory

USN-2487-1

Vendor Advisory

TA14-290A

Third Party Advisory, US Government Resource

http://www.vmware.com/security/advisories/VMSA-2015-0003.html

Third Party Advisory

http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0

Third Party Advisory

http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431

Third Party Advisory

http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439

Third Party Advisory

http://www-01.ibm.com/support/docview.wss?uid=swg21686997

Third Party Advisory

http://www-01.ibm.com/support/docview.wss?uid=swg21687172

Third Party Advisory

http://www-01.ibm.com/support/docview.wss?uid=swg21687611

Third Party Advisory

http://www-01.ibm.com/support/docview.wss?uid=swg21688283

Third Party Advisory

http://www-01.ibm.com/support/docview.wss?uid=swg21692299

Third Party Advisory

http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm

Third Party Advisory

https://access.redhat.com/articles/1232123

Third Party Advisory

https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/

Third Party Advisory

https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6

Third Party Advisory

https://bto.bluecoat.com/security-advisory/sa83

Third Party Advisory

https://bugzilla.mozilla.org/show_bug.cgi?id=1076983

Issue Tracking

https://bugzilla.redhat.com/show_bug.cgi?id=1152789

Issue Tracking

https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip

Third Party Advisory

https://github.com/mpgn/poodle-PoC

Third Party Advisory

https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946

Third Party Advisory

https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02

Third Party Advisory, US Government Resource

https://kc.mcafee.com/corporate/index?page=content&id=SB10090

Third Party Advisory

https://kc.mcafee.com/corporate/index?page=content&id=SB10091

Third Party Advisory

https://kc.mcafee.com/corporate/index?page=content&id=SB10104

Third Party Advisory

[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html

Third Party Advisory

[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html

Third Party Advisory

[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html

https://puppet.com/security/cve/poodle-sslv3-vulnerability

Third Party Advisory

GLSA-201507-14

Third Party Advisory

GLSA-201606-11

Third Party Advisory

https://security.netapp.com/advisory/ntap-20141015-0001/

Third Party Advisory

https://support.apple.com/HT205217

Vendor Advisory

https://support.apple.com/kb/HT6527

Vendor Advisory

https://support.apple.com/kb/HT6529

Vendor Advisory

https://support.apple.com/kb/HT6531

Vendor Advisory

https://support.apple.com/kb/HT6535

Vendor Advisory

https://support.apple.com/kb/HT6536

Vendor Advisory

https://support.apple.com/kb/HT6541

Vendor Advisory

https://support.apple.com/kb/HT6542

Vendor Advisory

https://support.citrix.com/article/CTX216642

Third Party Advisory

https://support.lenovo.com/product_security/poodle

Third Party Advisory

https://support.lenovo.com/us/en/product_security/poodle

Third Party Advisory

https://technet.microsoft.com/library/security/3009008.aspx

Patch, Vendor Advisory

https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html

Third Party Advisory

https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html

Third Party Advisory

https://www.elastic.co/blog/logstash-1-4-3-released

Third Party Advisory

https://www.imperialviolet.org/2014/10/14/poodle.html

Third Party Advisory

https://www.openssl.org/~bodo/ssl-poodle.pdf

Vendor Advisory

https://www.openssl.org/news/secadv_20141015.txt

Vendor Advisory

https://www.suse.com/support/kb/doc.php?id=7015773

Third Party Advisory

https://www-01.ibm.com/support/docview.wss?uid=swg21688165

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.