There is a new vulnerability found in the SSL 3.0 protocol, All implementations of SSL 3.0 are affected.
Red Hat CVE CVE-2014-3566
What Is POODLE Vulnerability?
POODLE stands for Padding Oracle On Downgraded Legacy Encryption. This vulnerability allows a man-in-the-middle attacker to decrypt the Cipher-text using a padding oracle side-channel attack. More details are available in the OpenSSL advisory.
POODLE affects older standards of encryption, specifically Secure Socket Layer (SSL) version 3.0. It does not affect the newer encryption mechanism known as Transport Socket Layer (TLS).
SSL certificates are not effected. Ie, you don’t need to reissue your certificate even if you found your server as vulnerable.
Recommendations
To mitigate this vulnerability SSL 3.0 should be disabled in all affected packages.
Determining Vulnerability
Run the Following Script from your server. If you get SSL 3.0 enabled – VULNERABLE.
You are safe, If you get SSL 3.0 enabled – Not vulnerable,
#!/bin/bash ret=$(echo Q | timeout 5 openssl s_client -connect "$1:${2-443}" -ssl3 2> /dev/null) if echo "${ret}" | grep -q 'Protocol.*SSLv3'; then if echo "${ret}" | grep -q 'Cipher.*0000'; then echo "SSL 3.0 disabled - $1 Not Vulnerable" else echo "SSL 3.0 enabled - $1 VULNERABLE" fi else echo "SSL disabled or other error" fi
Usage : poodle.sh www.exampe.com
Redhat Customers can use the Online tool From Red Hat labs.
Resolution
Disable SSLv2 and SSLv3 (Enable everything except SSLv2 and SSLv3), in httpd.conf
SSLProtocol All -SSLv2 -SSLv3
Restart httpd Service
# service httpd restart
Links
Red Hat Article – POODLE SSLv3 vulnerability