Facebook Twitter Instagram
    TecAdmin
    • Home
    • FeedBack
    • Submit Article
    • About Us
    Facebook Twitter Instagram
    TecAdmin
    You are at:Home»Security»How to Secure from POODLE SSLv3 Vulnerability (CVE-2014-3566)

    How to Secure from POODLE SSLv3 Vulnerability (CVE-2014-3566)

    By RahulOctober 15, 20141 Min Read

    POODLE (CVE-2014-3566) is an security vulnerability in SSLv3 discovered by Google in September. POODLE stands for Padding Oracle On Downgraded Legacy Encryption. All the websites supporting SSLv3 is vulnerable to POODLE, even if it also supports more recent versions of TLS. Using POODLE a hacker run Man-in-the-middle attacks attacks in your network stream and can steal secure HTTP cookies. This vulnerability has been found in SSLv3. For more information visit openssl security advisory.

    Advertisement

    poodle-openssl

    Fix POODLE (CVE-2014-3566):

    The easy and best solution is from preventing POODLE is disabling SSLv3 support from server side.

    Apache Users:

    Apache users edit your Apache configuration file /etc/httpd/conf.d/ssl.conf and update following values like below after making changes restart Apache service.

    SSLProtocol all -SSLv3 -SSLv2
    

    NGINX Users:

    All the NGINX users edit your nginx configuration file /etc/nginx/nginx.conf and update following values as below. After updating setting restart nginx service.

    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
    

    CVE-2014-3566 Openssl POODLE SSL SSLv3 Vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp

    Related Posts

    Preventing SQL injection attacks with prepared statements in MySQL

    How to block bad bots using .htaccess

    How to Open Port in Linux

    Add A Comment

    Leave A Reply Cancel Reply

    Advertisement
    Recent Posts
    • Implementing a Linux Server Security Audit: Best Practices and Tools
    • cp Command in Linux (Copy Files Like a Pro)
    • 15 Practical Examples of dd Command in Linux
    • dd Command in Linux (Syntax, Options and Use Cases)
    • Iptables: Common Firewall Rules and Commands
    Facebook Twitter Instagram Pinterest
    © 2023 Tecadmin.net. All Rights Reserved | Terms  | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.