Secure Socket Layer (SSL) 3.0 Vulnerability

Number: AL14-035
Date: 15 October 2014

Purpose

The purpose of this Alert is to bring attention to a recently identified vulnerability in SSL version 3.0.

Assessment

Details of a vulnerability in Secure Socket Layer (SSL) version 3.0 have been published by security researchers. SSL 3.0 is considered an obsolete and insecure protocol which is nearly 15 years old, but is still widely supported on client browsers and web servers for backward compatibility purposes. A known attack technique dubbed the “POODLE” (Padding Oracle On Downgraded Legacy Encryption) attack, may allow the plaintext of secure connections to be calculated by a network attacker via a man-in-the-middle (MITM) attack to steal information such as “secure” HTTP cookies when using the nondeterministic CBC (Cipher Block Chaining) padding.

Software vendors have not yet released patches to address this vulnerability but a workaround is available to temporarily mitigate this issue.

The National Vulnerability Database (NVD) provides a summary for each vulnerability and references to advisories, solutions and tools. CCIRC recommends monitoring this link closely for updates to vendor patches.

CVE-2014-3566
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566

Suggested action

CCIRC recommends that system administrators identify their affected assets and potential interdependencies with their organization's critical services, and implement the mitigations described below. Public-facing web servers and client web browsers should be addressed as top priorities.

Web Servers and Client Browsers:

References

https://www.openssl.org/~bodo/ssl-poodle.pdf
http://googleonlinesecurity.blogspot.ca/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
https://technet.microsoft.com/library/security/3009008.aspx
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
https://access.redhat.com/articles/1232123

Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.
http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/_fl/CCIRCPublicPGPKey.txt

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589
E-mail: ps.communications-communications.sp@canada.ca

Date modified: