{"id":3810,"date":"2014-10-16T06:23:57","date_gmt":"2014-10-15T22:23:57","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3810"},"modified":"2015-09-09T19:36:44","modified_gmt":"2015-09-09T11:36:44","slug":"everything-need-know-poodle-sslv3-vulnerability","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2014\/10\/everything-need-know-poodle-sslv3-vulnerability\/","title":{"rendered":"Everything You Need To Know About POODLE SSLv3 Vulnerability"},"content":{"rendered":"

So yah, it’s been quite a year – not long after Heartbleed<\/a> and then Shellshock<\/a> we now have POODLE SSLv3 vulnerability.<\/p>\n

Yes, that’s right – POODLE. It is actually an acronym this time though, yay (P<\/strong>adding O<\/strong>racle O<\/strong>n D<\/strong>owngraded L<\/strong>egacy).<\/p>\n

\"POODLE<\/p>\n

Is it a huge risk? Not really as it doesn’t allow any type of remote exploitation, it does however allow for SSLv3 Man-in-the-middle (MITM) attacks though – which is not good. It’s a fundamental design flaw in SSL\/TLS which authenticates before encrypting.<\/p>\n

Researchers have discovered a security vulnerability in SSL 3.0 that allows attackers to decrypt encrypted website connections.<\/p>\n

Miscreants can exploit a weakness in the protocol’s design to grab victims’ secret session cookies. These can be used to log into online accounts, such as webmail, social networks, and so on. The attack is, we’re told, easy to perform, and can be done on-the-fly using JavaScript \u2013 provided you can intercept the victim’s packets, perhaps by setting up a malicious Wi-Fi point in a cafe or bar.<\/p>\n

SSL is supposed to encrypt your communications, such as your connection to your bank’s website, so eavesdroppers can’t steal or tamper with your sensitive information while it’s in transit. Google revealed details of the design flaw on Tuesday, and dubbed it POODLE \u2013 short for Padding Oracle On Downgraded Legacy Encryption. It is a blunder within the blueprints of SSL 3.0 rather than a software bug, so it affects any product following the protocol \u2013 from Google Chrome and Mozilla Firefox to Microsoft Internet Explorer.<\/p><\/blockquote>\n