Many modern TLS clients can fall back to version 3.0 of the SSL protocol, which is vulnerable to a padding-oracle attack when Cypher-block chaining (CBC) mode is used. This is commonly referred to as the "POODLE" (Padding Oracle On Downgraded Legacy Encryption) attack.
Description
CWE-327: Use of a Broken or Risky Cryptographic Algorithm - CVE-2014-3566 Multiple implementations of SSL 3.0, including the implementation in OpenSSL up to version 1.0.1i, support the use of CBC mode. However, SSL 3.0 is vulnerable to a padding-oracle attack when CBC mode is used. A successful padding-oracle attack can provide an attacker with cleartext information from the encrypted communications. |
Impact
An adjacent, unauthenticated attacker may be able to derive cleartext information from communications that utilize the SSL 3.0 protocol with CBC mode. |
Solution
OpenSSL has fixed the issue in OpenSSL versions 1.0.1j, 1.0.0o, and 0.9.8zc. For other implementations of the protocol, please check with the appropriate maintainer or vendor to determine if the implementation is affected by this issue. Additionally, consider the following workaround: |
Use TLS_FALLBACK_SCSV |
Vendor Information (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
OpenSSL | Affected | - | 17 Oct 2014 |
Apache-SSL | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Apache HTTP Server Project | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Aruba Networks, Inc. | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Attachmate | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Botan | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Certicom | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Cryptlib | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Crypto++ Library | Unknown | 17 Oct 2014 | 17 Oct 2014 |
EMC Corporation | Unknown | 17 Oct 2014 | 17 Oct 2014 |
F5 Networks, Inc. | Unknown | 17 Oct 2014 | 17 Oct 2014 |
GnuTLS | Unknown | 17 Oct 2014 | 17 Oct 2014 |
IAIK Java Group | Unknown | 17 Oct 2014 | 17 Oct 2014 |
Legion of the Bouncy Castle | Unknown | 17 Oct 2014 | 17 Oct 2014 |
libgcrypt | Unknown | 17 Oct 2014 | 17 Oct 2014 |
If you are a vendor and your product is affected, let us know.View More »
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | 4.3 | AV:N/AC:M/Au:N/C:P/I:N/A:N |
Temporal | 3.6 | E:F/RL:OF/RC:C |
Environmental | 3.6 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://www.openssl.org/~bodo/ssl-poodle.pdf
- https://www.openssl.org/news/secadv_20141015.txt
- https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
- https://www.us-cert.gov/ncas/alerts/TA14-290A
Credit
This document was written by Todd Lewellen.
Other Information
- CVE IDs: CVE-2014-3566
- Date Public: 14 10월 2014
- Date First Published: 17 10월 2014
- Date Last Updated: 17 10월 2014
- Document Revision: 11
'취약점 정보1' 카테고리의 다른 글
SSL 3.0의 취약점 "POODLE"이란? (0) | 2014.10.18 |
---|---|
SSL 3.0 Protocol Vulnerability and POODLE Attack (0) | 2014.10.18 |
Centreon contains multiple vulnerabilities (0) | 2014.10.18 |
Advisory: Oracle Forms 10g Unauthenticated Remote Code Execution (CVE-2014-4278) (0) | 2014.10.16 |
Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software (0) | 2014.10.16 |