CVE-2014-3566

Description

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Category

3.4
CVSS
Severity: Low
CVSS 3.1 •
CVSS 2.0 •
EPSS 94.20% Top 5%
Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory opensuse.org Vendor Advisory neohapsis.com Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory debian.org Vendor Advisory marc.info Vendor Advisory debian.org Vendor Advisory marc.info Vendor Advisory securityfocus.com Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory gentoo.org Vendor Advisory redhat.com Vendor Advisory debian.org Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory apple.com Vendor Advisory opensuse.org Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory neohapsis.com Vendor Advisory debian.org Vendor Advisory fedoraproject.org Vendor Advisory ubuntu.com Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory netbsd.org Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory opensuse.org Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory fedoraproject.org Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory opensuse.org Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory opensuse.org Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory marc.info Vendor Advisory ubuntu.com Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory cisco.com Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory opensuse.org Vendor Advisory securityfocus.com Vendor Advisory gentoo.org Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory hp.com Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory mandriva.com Vendor Advisory fedoraproject.org Vendor Advisory marc.info Vendor Advisory securityfocus.com Vendor Advisory mandriva.com Vendor Advisory marc.info Vendor Advisory opensuse.org Vendor Advisory apple.com Vendor Advisory opensuse.org Vendor Advisory opensuse.org Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory fedoraproject.org Vendor Advisory marc.info Vendor Advisory debian.org Vendor Advisory marc.info Vendor Advisory marc.info Vendor Advisory redhat.com Vendor Advisory fedoraproject.org Vendor Advisory marc.info Vendor Advisory apple.com Vendor Advisory apple.com Vendor Advisory apple.com Vendor Advisory apple.com Vendor Advisory apple.com Vendor Advisory apple.com Vendor Advisory apple.com Vendor Advisory apple.com Vendor Advisory microsoft.com Vendor Advisory openssl.org Vendor Advisory openssl.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://marc.info/?l=bugtraq&m=142103967620673&w=2 third party advisory vendor advisory
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc third party advisory
http://www.securitytracker.com/id/1031090 vdb entry third party advisory
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/ third party advisory
http://rhn.redhat.com/errata/RHSA-2014-1880.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142804214608580&w=2 third party advisory vendor advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635 third party advisory
http://www.kb.cert.org/vuls/id/577193 third party advisory us government resource
http://marc.info/?l=bugtraq&m=141577087123040&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141715130023061&w=2 third party advisory vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html third party advisory vendor advisory
https://support.apple.com/kb/HT6542 vendor advisory
http://www.securitytracker.com/id/1031106 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=141697638231025&w=2 third party advisory vendor advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html third party advisory
http://marc.info/?l=openssl-dev&m=141333049205629&w=2 third party advisory mailing list
http://marc.info/?l=bugtraq&m=142350298616097&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142350743917559&w=2 third party advisory vendor advisory
http://secunia.com/advisories/60056 third party advisory
http://rhn.redhat.com/errata/RHSA-2014-1877.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141477196830952&w=2 third party advisory vendor advisory
http://secunia.com/advisories/61130 third party advisory
http://rhn.redhat.com/errata/RHSA-2015-1546.html third party advisory vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html third party advisory vendor advisory
https://support.apple.com/kb/HT6529 vendor advisory
https://www.openssl.org/news/secadv_20141015.txt vendor advisory
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html third party advisory vendor advisory
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 third party advisory
http://rhn.redhat.com/errata/RHSA-2014-1920.html third party advisory vendor advisory
http://www.securitytracker.com/id/1031087 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=143628269912142&w=2 third party advisory vendor advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667 third party advisory
https://bto.bluecoat.com/security-advisory/sa83 third party advisory
http://marc.info/?l=bugtraq&m=141879378918327&w=2 third party advisory vendor advisory
http://support.citrix.com/article/CTX200238 third party advisory
http://secunia.com/advisories/61359 third party advisory
https://support.apple.com/kb/HT6541 vendor advisory
http://www.securitytracker.com/id/1031093 vdb entry third party advisory
http://www.securitytracker.com/id/1031132 vdb entry third party advisory
http://www.debian.org/security/2015/dsa-3144 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142721887231400&w=2 third party advisory vendor advisory
http://www.debian.org/security/2015/dsa-3253 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2 third party advisory vendor advisory
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 third party advisory
https://www.suse.com/support/kb/doc.php?id=7015773 third party advisory
http://www.securityfocus.com/archive/1/533724/100/0/threaded vdb entry third party advisory vendor advisory
https://www.elastic.co/blog/logstash-1-4-3-released third party advisory
http://marc.info/?l=bugtraq&m=142296755107581&w=2 third party advisory vendor advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html third party advisory patch
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html third party advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 third party advisory
http://marc.info/?l=bugtraq&m=142805027510172&w=2 third party advisory vendor advisory
http://secunia.com/advisories/61827 third party advisory
http://marc.info/?l=bugtraq&m=141450452204552&w=2 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2015-0079.html third party advisory vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21688283 third party advisory
http://marc.info/?l=bugtraq&m=142791032306609&w=2 third party advisory vendor advisory
https://technet.microsoft.com/library/security/3009008.aspx patch vendor advisory
http://rhn.redhat.com/errata/RHSA-2015-1545.html third party advisory vendor advisory
https://www-01.ibm.com/support/docview.wss?uid=swg21688165 third party advisory
http://marc.info/?l=bugtraq&m=142624619906067&w=2 third party advisory vendor advisory
http://www.securitytracker.com/id/1031094 vdb entry third party advisory
http://www.vmware.com/security/advisories/VMSA-2015-0003.html third party advisory
http://secunia.com/advisories/61316 third party advisory
https://security.gentoo.org/glsa/201606-11 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2014-1881.html third party advisory vendor advisory
https://www.imperialviolet.org/2014/10/14/poodle.html third party advisory
http://www.securitytracker.com/id/1031096 vdb entry third party advisory
http://secunia.com/advisories/61810 third party advisory
http://www.debian.org/security/2014/dsa-3053 third party advisory vendor advisory
https://support.lenovo.com/us/en/product_security/poodle third party advisory
http://www.securitytracker.com/id/1031107 vdb entry third party advisory
http://www.securitytracker.com/id/1031095 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=143290583027876&w=2 third party advisory vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142962817202793&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=143101048219218&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142118135300698&w=2 third party advisory vendor advisory
http://www.securitytracker.com/id/1031091 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=142495837901899&w=2 third party advisory vendor advisory
http://www.securitytracker.com/id/1031123 vdb entry third party advisory
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566 third party advisory
https://support.apple.com/HT205217 vendor advisory
http://www.securitytracker.com/id/1031092 vdb entry third party advisory
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html third party advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html third party advisory vendor advisory
http://secunia.com/advisories/61926 third party advisory
http://rhn.redhat.com/errata/RHSA-2014-1876.html third party advisory vendor advisory
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html third party advisory
http://marc.info/?l=bugtraq&m=141450973807288&w=2 third party advisory vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html third party advisory vendor advisory
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf third party advisory
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html third party advisory
http://marc.info/?l=bugtraq&m=141814011518700&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=145983526810210&w=2 third party advisory vendor advisory
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html mailing list third party advisory vendor advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983 issue tracking
https://support.apple.com/kb/HT6531 vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html third party advisory vendor advisory
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip third party advisory
http://rhn.redhat.com/errata/RHSA-2015-0264.html third party advisory vendor advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10091 third party advisory
https://support.apple.com/kb/HT6527 vendor advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html third party advisory
http://marc.info/?l=bugtraq&m=142350196615714&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141697676231104&w=2 third party advisory vendor advisory
http://secunia.com/advisories/60206 third party advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1152789 issue tracking
http://secunia.com/advisories/60792 third party advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html third party advisory
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html third party advisory vendor advisory
http://www.debian.org/security/2016/dsa-3489 third party advisory vendor advisory
https://security.netapp.com/advisory/ntap-20141015-0001/ third party advisory
http://www.securitytracker.com/id/1031105 vdb entry third party advisory
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html third party advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html third party advisory vendor advisory
http://www.securitytracker.com/id/1031131 vdb entry third party advisory
http://www.ubuntu.com/usn/USN-2487-1 vendor advisory
http://marc.info/?l=bugtraq&m=142740155824959&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141813976718456&w=2 third party advisory vendor advisory
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html third party advisory
http://www.securitytracker.com/id/1031130 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=142721830231196&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141577350823734&w=2 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2014-1948.html third party advisory vendor advisory
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141620103726640&w=2 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2014-1653.html third party advisory vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=144101915224472&w=2 third party advisory vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431 third party advisory
http://support.apple.com/HT204244 third party advisory
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx third party advisory
http://marc.info/?l=bugtraq&m=142624679706236&w=2 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2015-0085.html third party advisory vendor advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html third party advisory
https://support.apple.com/kb/HT6536 vendor advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141576815022399&w=2 third party advisory vendor advisory
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=143290371927178&w=2 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2014-1652.html third party advisory vendor advisory
https://support.apple.com/kb/HT6535 vendor advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 third party advisory us government resource
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142546741516006&w=2 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2015-0086.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=143039249603103&w=2 third party advisory vendor advisory
http://www.securitytracker.com/id/1031124 vdb entry third party advisory
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html third party advisory vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2015-0080.html third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2014-1882.html third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2015-0068.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142354438527235&w=2 third party advisory vendor advisory
http://www.ubuntu.com/usn/USN-2486-1 vendor advisory
http://marc.info/?l=bugtraq&m=144294141001552&w=2 third party advisory vendor advisory
http://secunia.com/advisories/59627 third party advisory
http://marc.info/?l=bugtraq&m=141694355519663&w=2 third party advisory vendor advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html third party advisory patch
http://marc.info/?l=bugtraq&m=143290437727362&w=2 third party advisory vendor advisory
https://support.lenovo.com/product_security/poodle third party advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=141775427104070&w=2 third party advisory vendor advisory
http://rhn.redhat.com/errata/RHSA-2015-0698.html third party advisory vendor advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html third party advisory
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html third party advisory vendor advisory
http://downloads.asterisk.org/pub/security/AST-2014-011.html third party advisory
http://secunia.com/advisories/60859 third party advisory
http://www.securityfocus.com/archive/1/533746 vdb entry third party advisory vendor advisory
https://security.gentoo.org/glsa/201507-14 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142624719706349&w=2 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142496355704097&w=2 third party advisory vendor advisory
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm third party advisory
http://secunia.com/advisories/61345 third party advisory
http://secunia.com/advisories/61019 third party advisory
http://www.securityfocus.com/bid/70574 vdb entry third party advisory
http://www.securitytracker.com/id/1031120 vdb entry third party advisory
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6 third party advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html third party advisory
http://secunia.com/advisories/61825 third party advisory
http://advisories.mageia.org/MGASA-2014-0416.html third party advisory
http://www.securitytracker.com/id/1031029 vdb entry third party advisory
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142624590206005&w=2 third party advisory vendor advisory
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/ third party advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681 third party advisory
http://marc.info/?l=bugtraq&m=143290522027658&w=2 third party advisory vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html third party advisory vendor advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10104 third party advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 third party advisory
http://secunia.com/advisories/61782 third party advisory
https://access.redhat.com/articles/1232123 third party advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 third party advisory vendor advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html third party advisory vendor advisory
http://www.securitytracker.com/id/1031085 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=144251162130364&w=2 third party advisory vendor advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html third party advisory patch
http://www.securityfocus.com/archive/1/533747 vdb entry third party advisory vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21687611 third party advisory
https://github.com/mpgn/poodle-PoC third party advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203 third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142607790919348&w=2 third party advisory vendor advisory
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html third party advisory
https://support.citrix.com/article/CTX216642 third party advisory
https://puppet.com/security/cve/poodle-sslv3-vulnerability third party advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html third party advisory vendor advisory
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html mailing list third party advisory vendor advisory
http://secunia.com/advisories/61303 third party advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21692299 third party advisory
http://www.securitytracker.com/id/1031039 vdb entry third party advisory
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html third party advisory vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21687172 third party advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html third party advisory vendor advisory
http://marc.info/?l=bugtraq&m=142624619906067 third party advisory vendor advisory
http://www.securitytracker.com/id/1031089 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=141628688425177&w=2 third party advisory vendor advisory
http://www.us-cert.gov/ncas/alerts/TA14-290A third party advisory us government resource
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html third party advisory vendor advisory
http://secunia.com/advisories/61819 third party advisory
http://marc.info/?l=bugtraq&m=142357976805598&w=2 third party advisory vendor advisory
http://www.securitytracker.com/id/1031088 vdb entry third party advisory
http://www.debian.org/security/2015/dsa-3147 third party advisory vendor advisory
http://secunia.com/advisories/61995 third party advisory
http://marc.info/?l=bugtraq&m=141703183219781&w=2 third party advisory vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686997 third party advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10090 third party advisory
http://www.securitytracker.com/id/1031086 vdb entry third party advisory
http://marc.info/?l=bugtraq&m=143558192010071&w=2 third party advisory vendor advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html third party advisory
http://rhn.redhat.com/errata/RHSA-2014-1692.html third party advisory vendor advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html third party advisory vendor advisory
https://www.openssl.org/~bodo/ssl-poodle.pdf vendor advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439 third party advisory
http://marc.info/?l=bugtraq&m=143558137709884&w=2 third party advisory vendor advisory
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E mailing list
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E mailing list
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E mailing list
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E mailing list
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E mailing list
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E mailing list
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://templatelab.com/ssl-poodle/

Frequently Asked Questions

What is the severity of CVE-2014-3566?
CVE-2014-3566 has been scored as a low severity vulnerability.
How to fix CVE-2014-3566?
To fix CVE-2014-3566, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2014-3566 being actively exploited in the wild?
It is possible that CVE-2014-3566 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~94% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.