Oct 14 2014, this bug CVE_2014-3566 has been found as a subtle but significant security weakness in version 3 of the SSL protocol. Severity level is Medium. Basically this vulnerability is not critical as Shellshock and Heartbleed.
The vendors's Recommendations:
1. Check Point response to the POODLE Bites vulnerability (CVE-2014-3566):
a. Check Point Customers
- Check Point products are not vulnerable to the “POODLE Bites” vulnerability (CVE-2014-3566). See our Security Alert: sk102989
- Implement the IPS protection, CPAI-2014-1909, to detect or block the use of SSL 3.0
- Configure Multi Portal, HTTPS Inspection, and Check Point OS to prevent web browser use of SSL 3.0
b. Non Check Point Customers
- Use Active Directory Group Policy Objects to disable the use of SSL 3.0
- Update your browser when a patch is available
- Disable SSL 3.0 in your clients and servers
- Test if your browser is vulnerable at www.poodletest.com
- Test if a particular domain name is vulnerable at www.poodlescan.com
2. Juniper Responding:
a. Junos:
Junos OS will update OpenSSL to add support for SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV) in a future release.
Connect Secure (SA / SSL VPN) / Policy Secure (IC / UAC), MAG Series:
b. ScreenOS:
A problem report has been submitted. Development is in the process of evaluating the best method to resolve this issue.
c. Junos Space:
Disable SSLv3 by changing the following files.
/etc/httpd/conf.d/webProxy.conf
/etc/httpd/conf.d/ssl.conf
/etc/httpd/conf.d/webConf/webProxyCertAuth.conf
The following line needs to be updated to remove references to SSLv3:
Original:
SSLProtocol -ALL +SSLv3 +TLSv1
Updated:
SSLProtocol -ALL +TLSv1
Restart httpd by typing 'service httpd restart'.
A future release of Junos Space will disable SSLv3 by default.
d. STRM/JSA Series:
Development is working on a patch to resolve this issue.
e. NSM3000/NSMXpress:
Edit /etc/httpd/conf/ssl.conf and change the SSLProtocol entry to:
SSLProtocol all -SSLv2 -SSLv3
f. IDP Signature:
Juniper has released signature SSL:AUDIT:SSL-V3-TRAFFIC in Sigpack 2430 to detect SSLv3 traffic.
3. Cisco Event Response: POODLE Vulnerability:
Details are in Cisco Page :
Vulnerable Products
4. Other Vendors
Apple has released a security update at the following link:Security Update 2014-005Asterisk has released a security advisory at the following link:AST-2014-011
BlackBerry has released a security notice at the following link: KB36397
FreeBSD has released a VuXML document at the following link: OpenSSL -- multiple vulnerabilities
Microsoft has released a security advisory at the following link: 3009008
OpenSSL has released a security advisory at the following link: secadv_20141015
Oracle has released a security advisory at the following link:Cryptographic Issues vulnerability
Red Hat has released a CVE statement and security advisories for bug ID 1152789 at the following links: CVE-2014-3566, RHSA-2014:1653, and RHSA-2014:1652
References:
a. Check Point response to the POODLE Bites vulnerability (CVE-2014-3566)
b. Cisco Security Advisory: SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability
No comments:
Post a Comment