exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20141015-poodle

Cisco Security Advisory 20141015-poodle
Posted Oct 16, 2014
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - On October 14, 2014, a vulnerability was publicly announced in the Secure Sockets Layer version 3 (SSLv3) protocol when using a block cipher in Cipher Block Chaining (CBC) mode. SSLv3 is a cryptographic protocol designed to provide communication security, which has been superseded by Transport Layer Security (TLS) protocols. By exploiting this vulnerability, an attacker could decrypt a subset of the encrypted communication.

tags | advisory, protocol
systems | cisco
SHA-256 | e37c09bb8f42444adad931a1177f7eaee6f5ff1580e021798171df47e8be0c80

Cisco Security Advisory 20141015-poodle

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability

Advisory ID: cisco-sa-20141015-poodle

Revision 1.0

For Public Release 2014 October 15 17:30 UTC (GMT)

+---------------------------------------------------------------------

Summary
+======

On October 14, 2014, a vulnerability was publicly announced in the Secure Sockets Layer version 3 (SSLv3) protocol when using a block cipher in Cipher Block Chaining (CBC) mode. SSLv3 is a cryptographic protocol designed to provide communication security, which has been superseded by Transport Layer Security (TLS) protocols. By exploiting this vulnerability, an attacker could decrypt a subset of the encrypted communication.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=Gs3Q
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close