Low severity3.4NVD Advisory· Published Oct 15, 2014· Updated May 6, 2026
CVE-2014-3566
CVE-2014-3566
Description
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
Affected products
147cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*+ 23 more
- cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*+ 62 more
- cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*+ 21 more
- cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
243- www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlnvdPatchThird Party Advisory
- technet.microsoft.com/library/security/3009008.aspxnvdPatchVendor Advisory
- ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.ascnvdThird Party Advisory
- advisories.mageia.org/MGASA-2014-0416.htmlnvdThird Party Advisory
- aix.software.ibm.com/aix/efixes/security/openssl_advisory11.ascnvdThird Party Advisory
- archives.neohapsis.com/archives/bugtraq/2014-10/0101.htmlnvdThird Party Advisory
- archives.neohapsis.com/archives/bugtraq/2014-10/0103.htmlnvdThird Party Advisory
- askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566nvdThird Party Advisory
- blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.htmlnvdThird Party Advisory
- blog.nodejs.org/2014/10/23/node-v0-10-33-stable/nvdThird Party Advisory
- blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspxnvdThird Party Advisory
- docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdfnvdThird Party Advisory
- downloads.asterisk.org/pub/security/AST-2014-011.htmlnvdThird Party Advisory
- googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.htmlnvdThird Party Advisory
- h20564.www2.hp.com/hpsc/doc/public/displaynvdThird Party Advisory
- h20564.www2.hpe.com/hpsc/doc/public/displaynvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlnvdMailing ListThird Party Advisory
- lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.htmlnvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1652.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1653.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1692.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1876.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1877.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1880.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1881.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1882.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1920.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1948.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0068.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0079.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0080.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0085.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0086.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0264.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0698.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1545.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1546.htmlnvdThird Party Advisory
- secunia.com/advisories/59627nvdThird Party Advisory
- secunia.com/advisories/60056nvdThird Party Advisory
- secunia.com/advisories/60206nvdThird Party Advisory
- secunia.com/advisories/60792nvdThird Party Advisory
- secunia.com/advisories/60859nvdThird Party Advisory
- secunia.com/advisories/61019nvdThird Party Advisory
- secunia.com/advisories/61130nvdThird Party Advisory
- secunia.com/advisories/61303nvdThird Party Advisory
- secunia.com/advisories/61316nvdThird Party Advisory
- secunia.com/advisories/61345nvdThird Party Advisory
- secunia.com/advisories/61359nvdThird Party Advisory
- secunia.com/advisories/61782nvdThird Party Advisory
- secunia.com/advisories/61810nvdThird Party Advisory
- secunia.com/advisories/61819nvdThird Party Advisory
- secunia.com/advisories/61825nvdThird Party Advisory
- secunia.com/advisories/61827nvdThird Party Advisory
- secunia.com/advisories/61926nvdThird Party Advisory
- secunia.com/advisories/61995nvdThird Party Advisory
- support.apple.com/HT204244nvdThird Party Advisory
- support.citrix.com/article/CTX200238nvdThird Party Advisory
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodlenvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.debian.org/security/2014/dsa-3053nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3144nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3147nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3253nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3489nvdThird Party Advisory
- www.kb.cert.org/vuls/id/577193nvdThird Party AdvisoryUS Government Resource
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/533724/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/533746nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/533747nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/70574nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031029nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031039nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031085nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031086nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031087nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031088nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031089nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031090nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031091nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031092nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031093nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031094nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031095nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031096nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031105nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031106nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031107nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031120nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031123nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031124nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031130nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031131nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1031132nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2486-1nvdVendor Advisory
- www.ubuntu.com/usn/USN-2487-1nvdVendor Advisory
- www.us-cert.gov/ncas/alerts/TA14-290AnvdThird Party AdvisoryUS Government Resource
- www.vmware.com/security/advisories/VMSA-2015-0003.htmlnvdThird Party Advisory
- www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0nvdThird Party Advisory
- www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htmnvdThird Party Advisory
- access.redhat.com/articles/1232123nvdThird Party Advisory
- blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/nvdThird Party Advisory
- blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6nvdThird Party Advisory
- bto.bluecoat.com/security-advisory/sa83nvdThird Party Advisory
- devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ipnvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- ics-cert.us-cert.gov/advisories/ICSMA-18-058-02nvdThird Party AdvisoryUS Government Resource
- kc.mcafee.com/corporate/indexnvdThird Party Advisory
- kc.mcafee.com/corporate/indexnvdThird Party Advisory
- kc.mcafee.com/corporate/indexnvdThird Party Advisory
- puppet.com/security/cve/poodle-sslv3-vulnerabilitynvdThird Party Advisory
- security.gentoo.org/glsa/201507-14nvdThird Party Advisory
- security.gentoo.org/glsa/201606-11nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20141015-0001/nvdThird Party Advisory
- support.apple.com/HT205217nvdVendor Advisory
- support.apple.com/kb/HT6527nvdVendor Advisory
- support.apple.com/kb/HT6529nvdVendor Advisory
- support.apple.com/kb/HT6531nvdVendor Advisory
- support.apple.com/kb/HT6535nvdVendor Advisory
- support.apple.com/kb/HT6536nvdVendor Advisory
- support.apple.com/kb/HT6541nvdVendor Advisory
- support.apple.com/kb/HT6542nvdVendor Advisory
- support.citrix.com/article/CTX216642nvdThird Party Advisory
- support.lenovo.com/product_security/poodlenvdThird Party Advisory
- support.lenovo.com/us/en/product_security/poodlenvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.htmlnvdThird Party Advisory
- www.dfranke.us/posts/2014-10-14-how-poodle-happened.htmlnvdThird Party Advisory
- www.elastic.co/blog/logstash-1-4-3-releasednvdThird Party Advisory
- www.imperialviolet.org/2014/10/14/poodle.htmlnvdThird Party Advisory
- www.openssl.org/news/secadv_20141015.txtnvdVendor Advisory
- www.openssl.org/~bodo/ssl-poodle.pdfnvdVendor Advisory
- www.suse.com/support/kb/doc.phpnvdThird Party Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue Tracking
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- groups.google.com/forum/nvd
- lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3Envd
- lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3Envd
- lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3Envd
- lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3Envd
- lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3Envd
- lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3Envd
- templatelab.com/ssl-poodle/nvd
- www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7nvd
News mentions
0No linked articles in our index yet.