Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

A New SSL Exploit in SSL v3.0 – POODLE attack

There is a critical Vulnerability in SSL v3.0. This vulnerability allows the plaintext of secure connections to be calculated by a network attacker.

Who will be affected?

Any secure connection (https) you make via your web Browser is at risk. That means visiting banks, PayPal, online shopping sites, etc are all vulnerable.

What will happen?

The attacker could potentially decrypt and read any of your sensitive data (passwords, etc) for any secure website you are connected to via https.

Are servers and clients both affected?

Yes, however the vulnerability exists only if both the server and client accept SSL v3.0 (which is the fallback cipher suite after TLSv1/TLSv1.1/TLS1.2 due to a downgrade attack).

How to test your browser against this vulnerability?

You can visit the following website to test your browser:

https://www.poodletest.com/

How to test your website against this vulnerability?

You can visit the following website to test your website:

http://www.poodlescan.com/

How to fix this?

The only correct way to fix POODLE is to Disable Ssl v3.0 in all your browsers. The problem is, there is not an easy way to do this right now. Each browser will be rolling out fixes soon so make sure to upgrade your browsers as soon as possible. Server admins should also disable SSL v3.0 on their servers.

If you are Firefox user, you can use the following addon to set minimum TLS version:

https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control/

To disable it for other browser, you can refer the following URL:

https://zmap.io/sslv3/browsers.html



This post first appeared on Web Hosting Blog - Web Hosting Discussion, please read the originial post: here

Share the post

A New SSL Exploit in SSL v3.0 – POODLE attack

×

Subscribe to Web Hosting Blog - Web Hosting Discussion

Get updates delivered right to your inbox!

Thank you for your subscription

×