CVE-2014-3566

NameCVE-2014-3566
DescriptionThe SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-157-1, DLA-282-1, DLA-400-1, DSA-3092-1, DSA-3144-1, DSA-3147-1, DSA-3253-1, DSA-3489-1
Debian Bugs765539, 765702, 765928, 768164, 769904, 769905, 771359

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bouncycastle (PTS)buster1.60-1fixed
bullseye1.68-2fixed
bookworm, sid1.71-1fixed
epiphany-browser (PTS)buster3.32.1.2-3~deb10u1vulnerable
buster (security)3.32.1.2-3~deb10u2vulnerable
bullseye (security), bullseye3.38.2-1+deb11u3vulnerable
bookworm42.4-1vulnerable
sid43.0-2vulnerable
erlang (PTS)buster1:21.2.6+dfsg-1fixed
bullseye1:23.2.6+dfsg-1fixed
bookworm, sid1:24.3.4.5+dfsg-1fixed
gnutls28 (PTS)buster3.6.7-4+deb10u8fixed
buster (security)3.6.7-4+deb10u9fixed
bullseye (security), bullseye3.7.1-5+deb11u2fixed
bookworm, sid3.7.7-2fixed
haskell-tls (PTS)buster1.4.1-3fixed
bookworm, bullseye1.5.4-1fixed
sid1.5.8-1fixed
lighttpd (PTS)buster, buster (security)1.4.53-4+deb10u2fixed
bullseye1.4.59-1+deb11u1fixed
bullseye (security)1.4.59-1+deb11u2fixed
bookworm, sid1.4.67-1fixed
midori (PTS)buster7.0-2vulnerable
bullseye7.0-2.1vulnerable
netsurf (PTS)bookworm, sid, bullseye3.10-1fixed
nss (PTS)buster, buster (security)2:3.42.1-1+deb10u5fixed
bullseye (security), bullseye2:3.61-1+deb11u2fixed
bookworm, sid2:3.83-1fixed
openjdk-8 (PTS)sid8u342-b07-1fixed
openssl (PTS)buster, buster (security)1.1.1n-0+deb10u3fixed
bullseye (security), bullseye1.1.1n-0+deb11u3fixed
bookworm3.0.5-2fixed
sid3.0.5-4fixed
pound (PTS)bullseye3.0-2fixed
bookworm, sid3.0.2-1fixed
surf (PTS)buster2.0+git20181009-4vulnerable
bullseye2.0+git20201107-2vulnerable
bookworm, sid2.1+git20220504-2vulnerable
wolfssl (PTS)bullseye4.6.0+p1-0+deb11u1fixed
bookworm, sid5.2.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
arorasource(unstable)(unfixed)unimportant
bouncycastlesource(unstable)(not affected)
chromium-browsersourcesqueeze(unfixed)end-of-life
chromium-browsersourcewheezy(unfixed)end-of-life
chromium-browsersource(unstable)39.0.2171.71-1765928
conkerorsource(unstable)(unfixed)unimportant
cyasslsource(unstable)(unfixed)769905
dwbsource(unstable)(unfixed)unimportant
epiphany-browsersource(unstable)(unfixed)unimportant
erlangsource(unstable)1:17.3-dfsg-3771359
galeonsource(unstable)(unfixed)unimportant
gnutls26source(unstable)(unfixed)
gnutls28source(unstable)3.3.8-5769904
haskell-tlssource(unstable)1.2.9-2768164
icedovesourcesqueeze(unfixed)end-of-life
icedovesourcewheezy31.3.0-1~deb7u1DSA-3092-1
icedovesource(unstable)31.3.0-1
iceweaselsourcesqueeze(unfixed)end-of-life
iceweaselsource(unstable)31.2.0esr-2
kazehakasesource(unstable)(unfixed)unimportant
kde-baseappssource(unstable)(unfixed)unimportant
kdebasesource(unstable)(unfixed)unimportant
lighttpdsourcesqueeze1.4.28-2+squeeze1.7DLA-282-1
lighttpdsourcewheezy1.4.31-4+deb7u4DSA-3489-1
lighttpdsource(unstable)1.4.35-4765702
matrixsslsource(unstable)(unfixed)low
midorisource(unstable)(unfixed)unimportant
netsurfsource(unstable)3.6-1unimportant
nsssource(unstable)2:3.17.1-1
openjdk-6sourcesqueeze6b34-1.13.6-1~deb6u1DLA-157-1
openjdk-6sourcewheezy6b34-1.13.6-1~deb7u1DSA-3147-1
openjdk-6source(unstable)6b34-1.13.6-1
openjdk-7sourcewheezy7u75-2.5.4-1~deb7u1DSA-3144-1
openjdk-7source(unstable)7u75-2.5.4-1
openjdk-8source(unstable)8u40~b04-1
opensslsource(unstable)1.0.1j-1
polarsslsource(unstable)1.3.9-2
poundsourcesqueeze2.6-1+deb6u1DLA-400-1
poundsourcewheezy2.6-2+deb7u1DSA-3253-1
poundsourcejessie2.6-6+deb8u1DSA-3253-1
poundsource(unstable)2.6-6765539
surfsource(unstable)(unfixed)unimportant
tlslitesource(unstable)(unfixed)
uzblsource(unstable)(unfixed)unimportant
wolfsslsource(unstable)3.4.8+dfsg-1

Notes

- bouncycastle <not-affected> (SSLv3 needs to be explicitly enabled)
http://www.kb.cert.org/vuls/id/BLUU-9PYTFQ
wolfssl actually fixed with the initial upload to unstable after the rename
[wheezy] - openssl <no-dsa> (Will be addressed through a point update, #774299)
[squeeze] - openssl <no-dsa> (Change considered too risky)
[squeeze] - gnutls26 <no-dsa> (Minor issue)
[wheezy] - gnutls26 <no-dsa> (Minor issue)
https://bugs.launchpad.net/ubuntu/+source/gnutls26/+bug/1510163
[wheezy] - haskell-tls <no-dsa> (Minor issue)
[squeeze] - matrixssl <no-dsa> (Minor issue)
[wheezy] - matrixssl <no-dsa> (Minor issue)
[squeeze] - nss <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
[wheezy] - nss <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
[squeeze] - polarssl <no-dsa> (Minor issue)
[wheezy] - polarssl <no-dsa> (Minor issue)
[squeeze] - pound <no-dsa> (Minor issue)
[wheezy] - tlslite <no-dsa> (Minor issue)
[squeeze] - erlang <no-dsa> (Minor issue)
[wheezy] - erlang <no-dsa> (Minor issue)
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://googleonlinesecurity.blogspot.fr/2014/10/this-poodle-bites-exploiting-ssl-30.html
This is only about the SSLv3 CBC padding, not about any downgrade attack or support for the fallback SCSV
Fix is to disable SSLv3 in library or application configurations
Browsers based on webkit (with the exception of Chromium) or khtml are not covered by security support

Search for package or bug name: Reporting problems