The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Project Subscriptions

Vendors Products
Mac Os X Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Suse Linux Enterprise Desktop Subscribe
Suse Linux Enterprise Server Subscribe
Suse Linux Enterprise Software Development Kit Subscribe
Openssl Subscribe
Openssl Subscribe
Opensuse Subscribe
Opensuse Subscribe
Database Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Desktop Supplementary Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Server Supplementary Subscribe
Enterprise Linux Workstation Subscribe
Enterprise Linux Workstation Supplementary Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Web Platform Subscribe
Jboss Enterprise Web Server Subscribe
Network Satellite Subscribe
Openshift Subscribe
Rhel Extras Subscribe
Rhel Extras Oracle Java Subscribe
Satellite Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-81-1 openssl security update
Debian DLA Debian DLA DLA-157-1 openjdk-6 security update
Debian DLA Debian DLA DLA-282-1 lighttpd security update
Debian DLA Debian DLA DLA-400-1 pound security update
Debian DSA Debian DSA DSA-3053-1 openssl security update
Debian DSA Debian DSA DSA-3144-1 openjdk-7 security update
Debian DSA Debian DSA DSA-3147-1 openjdk-6 security update
Debian DSA Debian DSA DSA-3253-1 pound security update
Debian DSA Debian DSA DSA-3489-1 lighttpd security update
Ubuntu USN Ubuntu USN USN-2486-1 OpenJDK 6 vulnerabilities
Ubuntu USN Ubuntu USN USN-2487-1 OpenJDK 7 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc cve-icon cve-icon
http://advisories.mageia.org/MGASA-2014-0416.html cve-icon cve-icon
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc cve-icon cve-icon
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html cve-icon cve-icon
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html cve-icon cve-icon
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566 cve-icon cve-icon
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html cve-icon cve-icon
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/ cve-icon cve-icon
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx cve-icon cve-icon
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf cve-icon cve-icon
http://downloads.asterisk.org/pub/security/AST-2014-011.html cve-icon cve-icon
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html cve-icon cve-icon
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581 cve-icon cve-icon
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141450452204552&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141450973807288&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141477196830952&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141576815022399&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141577087123040&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141577350823734&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141620103726640&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141628688425177&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141694355519663&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141697638231025&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141697676231104&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141703183219781&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141715130023061&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141775427104070&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141813976718456&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141814011518700&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141879378918327&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142103967620673&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142118135300698&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142296755107581&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142350196615714&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142350298616097&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142350743917559&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142354438527235&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142357976805598&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142495837901899&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142496355704097&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142546741516006&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142607790919348&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142624590206005&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142624619906067 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142624619906067&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142624679706236&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142624719706349&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142660345230545&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142721830231196&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142721887231400&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142740155824959&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142791032306609&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142804214608580&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142805027510172&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=142962817202793&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143039249603103&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143101048219218&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143290371927178&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143290437727362&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143290522027658&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143290583027876&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143558137709884&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143558192010071&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143628269912142&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144101915224472&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144251162130364&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144294141001552&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145983526810210&w=2 cve-icon cve-icon
http://marc.info/?l=openssl-dev&m=141333049205629&w=2 cve-icon cve-icon
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1652.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1653.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1692.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1876.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1877.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1880.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1881.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1882.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1920.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1948.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-0068.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-0079.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-0080.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-0085.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-0086.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-0264.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-0698.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1545.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1546.html cve-icon cve-icon
http://secunia.com/advisories/59627 cve-icon cve-icon
http://secunia.com/advisories/60056 cve-icon cve-icon
http://secunia.com/advisories/60206 cve-icon cve-icon
http://secunia.com/advisories/60792 cve-icon cve-icon
http://secunia.com/advisories/60859 cve-icon cve-icon
http://secunia.com/advisories/61019 cve-icon cve-icon
http://secunia.com/advisories/61130 cve-icon cve-icon
http://secunia.com/advisories/61303 cve-icon cve-icon
http://secunia.com/advisories/61316 cve-icon cve-icon
http://secunia.com/advisories/61345 cve-icon cve-icon
http://secunia.com/advisories/61359 cve-icon cve-icon
http://secunia.com/advisories/61782 cve-icon cve-icon
http://secunia.com/advisories/61810 cve-icon cve-icon
http://secunia.com/advisories/61819 cve-icon cve-icon
http://secunia.com/advisories/61825 cve-icon cve-icon
http://secunia.com/advisories/61827 cve-icon cve-icon
http://secunia.com/advisories/61926 cve-icon cve-icon
http://secunia.com/advisories/61995 cve-icon cve-icon
http://support.apple.com/HT204244 cve-icon cve-icon
http://support.citrix.com/article/CTX200238 cve-icon cve-icon
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21686997 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21687172 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21687611 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21688283 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21692299 cve-icon cve-icon
http://www.debian.org/security/2014/dsa-3053 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3144 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3147 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3253 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3489 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/577193 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/533724/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/533746 cve-icon cve-icon
http://www.securityfocus.com/archive/1/533747 cve-icon cve-icon
http://www.securityfocus.com/bid/70574 cve-icon cve-icon
http://www.securitytracker.com/id/1031029 cve-icon cve-icon
http://www.securitytracker.com/id/1031039 cve-icon cve-icon
http://www.securitytracker.com/id/1031085 cve-icon cve-icon
http://www.securitytracker.com/id/1031086 cve-icon cve-icon
http://www.securitytracker.com/id/1031087 cve-icon cve-icon
http://www.securitytracker.com/id/1031088 cve-icon cve-icon
http://www.securitytracker.com/id/1031089 cve-icon cve-icon
http://www.securitytracker.com/id/1031090 cve-icon cve-icon
http://www.securitytracker.com/id/1031091 cve-icon cve-icon
http://www.securitytracker.com/id/1031092 cve-icon cve-icon
http://www.securitytracker.com/id/1031093 cve-icon cve-icon
http://www.securitytracker.com/id/1031094 cve-icon cve-icon
http://www.securitytracker.com/id/1031095 cve-icon cve-icon
http://www.securitytracker.com/id/1031096 cve-icon cve-icon
http://www.securitytracker.com/id/1031105 cve-icon cve-icon
http://www.securitytracker.com/id/1031106 cve-icon cve-icon
http://www.securitytracker.com/id/1031107 cve-icon cve-icon
http://www.securitytracker.com/id/1031120 cve-icon cve-icon
http://www.securitytracker.com/id/1031123 cve-icon cve-icon
http://www.securitytracker.com/id/1031124 cve-icon cve-icon
http://www.securitytracker.com/id/1031130 cve-icon cve-icon
http://www.securitytracker.com/id/1031131 cve-icon cve-icon
http://www.securitytracker.com/id/1031132 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2486-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2487-1 cve-icon cve-icon
http://www.us-cert.gov/ncas/alerts/TA14-290A cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2015-0003.html cve-icon cve-icon
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 cve-icon cve-icon
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm cve-icon cve-icon
https://access.redhat.com/articles/1232123 cve-icon cve-icon
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/ cve-icon cve-icon
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6 cve-icon cve-icon
https://bto.bluecoat.com/security-advisory/sa83 cve-icon cve-icon
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1152789 cve-icon cve-icon
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip cve-icon cve-icon
https://github.com/mpgn/poodle-PoC cve-icon cve-icon
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 cve-icon cve-icon
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10090 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10091 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10104 cve-icon cve-icon
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2014-3566 cve-icon
https://puppet.com/security/cve/poodle-sslv3-vulnerability cve-icon cve-icon
https://security.gentoo.org/glsa/201507-14 cve-icon cve-icon
https://security.gentoo.org/glsa/201606-11 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20141015-0001/ cve-icon cve-icon
https://support.apple.com/HT205217 cve-icon cve-icon
https://support.apple.com/kb/HT6527 cve-icon cve-icon
https://support.apple.com/kb/HT6529 cve-icon cve-icon
https://support.apple.com/kb/HT6531 cve-icon cve-icon
https://support.apple.com/kb/HT6535 cve-icon cve-icon
https://support.apple.com/kb/HT6536 cve-icon cve-icon
https://support.apple.com/kb/HT6541 cve-icon cve-icon
https://support.apple.com/kb/HT6542 cve-icon cve-icon
https://support.citrix.com/article/CTX216642 cve-icon cve-icon
https://support.lenovo.com/product_security/poodle cve-icon cve-icon
https://support.lenovo.com/us/en/product_security/poodle cve-icon cve-icon
https://technet.microsoft.com/library/security/3009008.aspx cve-icon cve-icon
https://templatelab.com/ssl-poodle/ cve-icon
https://www-01.ibm.com/support/docview.wss?uid=swg21688165 cve-icon cve-icon
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7 cve-icon cve-icon
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2014-3566 cve-icon
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html cve-icon cve-icon
https://www.elastic.co/blog/logstash-1-4-3-released cve-icon cve-icon
https://www.imperialviolet.org/2014/10/14/poodle.html cve-icon cve-icon
https://www.openssl.org/news/secadv_20141015.txt cve-icon cve-icon
https://www.openssl.org/~bodo/ssl-poodle.pdf cve-icon cve-icon
https://www.suse.com/support/kb/doc.php?id=7015773 cve-icon cve-icon
History

Wed, 27 Nov 2024 20:45:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-11-27T19:31:57.733Z

Reserved: 2014-05-14T00:00:00.000Z

Link: CVE-2014-3566

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-10-15T00:55:02.137

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3566

cve-icon Redhat

Severity : Important

Publid Date: 2014-10-14T00:00:00Z

Links: CVE-2014-3566 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses