CVE-2014-3566

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

References

https://www.openssl.org/~bodo/ssl-poodle.pdf

http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html

http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html

https://bugzilla.mozilla.org/show_bug.cgi?id=1076983

https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip

http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx

http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html

https://bugzilla.redhat.com/show_bug.cgi?id=1152789

https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html

https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/

https://access.redhat.com/articles/1232123

https://www.imperialviolet.org/2014/10/14/poodle.html

http://marc.info/?l=openssl-dev&m=141333049205629&w=2

http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566

https://technet.microsoft.com/library/security/3009008.aspx

https://www.suse.com/support/kb/doc.php?id=7015773

http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html

https://support.apple.com/kb/HT6536

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle

https://support.apple.com/kb/HT6542

https://support.apple.com/kb/HT6541

http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html

https://support.apple.com/kb/HT6535

http://www.securityfocus.com/archive/1/533746

http://www.securityfocus.com/archive/1/533747

http://www.securitytracker.com/id/1031096

http://www.securitytracker.com/id/1031085

http://secunia.com/advisories/60056

http://www.securitytracker.com/id/1031029

http://www.securitytracker.com/id/1031092

http://www.securityfocus.com/bid/70574

http://www.securitytracker.com/id/1031088

https://support.apple.com/kb/HT6527

http://www.securitytracker.com/id/1031095

http://secunia.com/advisories/61827

http://secunia.com/advisories/61345

http://www.securitytracker.com/id/1031091

https://support.apple.com/kb/HT6531

https://bto.bluecoat.com/security-advisory/sa83

http://www.securitytracker.com/id/1031105

http://secunia.com/advisories/60792

http://secunia.com/advisories/61303

http://www.securitytracker.com/id/1031123

http://www.securitytracker.com/id/1031087

http://www.securitytracker.com/id/1031107

http://www.securitytracker.com/id/1031094

http://www.mandriva.com/security/advisories?name=MDVSA-2014:203

http://www.securitytracker.com/id/1031090

http://secunia.com/advisories/61810

http://www-01.ibm.com/support/docview.wss?uid=swg21687172

http://secunia.com/advisories/61019

http://www.securitytracker.com/id/1031039

http://www.securitytracker.com/id/1031093

http://secunia.com/advisories/61825

http://www.securitytracker.com/id/1031106

http://www.securitytracker.com/id/1031086

https://support.apple.com/kb/HT6529

http://secunia.com/advisories/61782

http://www.securitytracker.com/id/1031089

http://secunia.com/advisories/61359

http://rhn.redhat.com/errata/RHSA-2014-1652.html

http://marc.info/?l=bugtraq&m=141477196830952&w=2

http://www.kb.cert.org/vuls/id/577193

http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html

http://marc.info/?l=bugtraq&m=141450452204552&w=2

http://marc.info/?l=bugtraq&m=141450973807288&w=2

http://www.debian.org/security/2014/dsa-3053

https://www.openssl.org/news/secadv_20141015.txt

http://www.us-cert.gov/ncas/alerts/TA14-290A

http://rhn.redhat.com/errata/RHSA-2014-1692.html

http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439

http://secunia.com/advisories/61926

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc

http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html

http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431

http://www-01.ibm.com/support/docview.wss?uid=swg21686997

http://secunia.com/advisories/61819

http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/

http://advisories.mageia.org/MGASA-2014-0416.html

http://www.securitytracker.com/id/1031131

http://secunia.com/advisories/61130

https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6

http://secunia.com/advisories/60859

http://www.securitytracker.com/id/1031130

http://www.securitytracker.com/id/1031120

http://secunia.com/advisories/61995

http://support.citrix.com/article/CTX200238

http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html

http://www.securitytracker.com/id/1031132

http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html

http://secunia.com/advisories/60206

http://secunia.com/advisories/59627

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc

http://secunia.com/advisories/61316

http://rhn.redhat.com/errata/RHSA-2014-1653.html

http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html

http://www.securitytracker.com/id/1031124

http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html

http://www-01.ibm.com/support/docview.wss?uid=swg21687611

http://marc.info/?l=bugtraq&m=141703183219781&w=2

http://marc.info/?l=bugtraq&m=141697676231104&w=2

http://marc.info/?l=bugtraq&m=141715130023061&w=2

http://marc.info/?l=bugtraq&m=141694355519663&w=2

http://www-01.ibm.com/support/docview.wss?uid=swg21688283

http://downloads.asterisk.org/pub/security/AST-2014-011.html

http://marc.info/?l=bugtraq&m=141697638231025&w=2

http://rhn.redhat.com/errata/RHSA-2014-1880.html

http://rhn.redhat.com/errata/RHSA-2014-1876.html

http://rhn.redhat.com/errata/RHSA-2014-1881.html

http://rhn.redhat.com/errata/RHSA-2014-1882.html

https://www-01.ibm.com/support/docview.wss?uid=swg21688165

http://rhn.redhat.com/errata/RHSA-2014-1877.html

http://rhn.redhat.com/errata/RHSA-2014-1920.html

http://rhn.redhat.com/errata/RHSA-2014-1948.html

http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html

http://marc.info/?l=bugtraq&m=141775427104070&w=2

http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html

http://support.apple.com/HT204244

http://marc.info/?l=bugtraq&m=142296755107581&w=2

http://marc.info/?l=bugtraq&m=141813976718456&w=2

http://marc.info/?l=bugtraq&m=142354438527235&w=2

http://www.debian.org/security/2015/dsa-3144

http://marc.info/?l=bugtraq&m=141814011518700&w=2

http://marc.info/?l=bugtraq&m=142496355704097&w=2

http://www.debian.org/security/2015/dsa-3147

http://marc.info/?l=bugtraq&m=142546741516006&w=2

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html

http://marc.info/?l=bugtraq&m=142350196615714&w=2

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html

http://www.ubuntu.com/usn/USN-2486-1

http://marc.info/?l=bugtraq&m=141879378918327&w=2

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html

http://marc.info/?l=bugtraq&m=142350298616097&w=2

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html

http://marc.info/?l=bugtraq&m=142103967620673&w=2

http://marc.info/?l=bugtraq&m=142357976805598&w=2

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html

http://www.ubuntu.com/usn/USN-2487-1

http://marc.info/?l=bugtraq&m=142495837901899&w=2

http://marc.info/?l=bugtraq&m=142350743917559&w=2

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html

http://rhn.redhat.com/errata/RHSA-2015-0080.html

http://marc.info/?l=bugtraq&m=142624619906067

http://marc.info/?l=bugtraq&m=142607790919348&w=2

http://rhn.redhat.com/errata/RHSA-2015-0086.html

http://marc.info/?l=bugtraq&m=142624619906067&w=2

http://rhn.redhat.com/errata/RHSA-2015-0264.html

http://rhn.redhat.com/errata/RHSA-2015-0085.html

http://marc.info/?l=bugtraq&m=142624679706236&w=2

http://marc.info/?l=bugtraq&m=142624719706349&w=2

http://marc.info/?l=bugtraq&m=142118135300698&w=2

http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581

http://marc.info/?l=bugtraq&m=142624590206005&w=2

http://rhn.redhat.com/errata/RHSA-2015-0068.html

http://rhn.redhat.com/errata/RHSA-2015-0079.html

http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html

http://marc.info/?l=bugtraq&m=142660345230545&w=2

http://rhn.redhat.com/errata/RHSA-2015-0698.html

http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html

http://marc.info/?l=bugtraq&m=142721830231196&w=2

http://marc.info/?l=bugtraq&m=142721887231400&w=2

http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0

http://marc.info/?l=bugtraq&m=142740155824959&w=2

http://www.mandriva.com/security/advisories?name=MDVSA-2015:062

http://marc.info/?l=bugtraq&m=142791032306609&w=2

http://marc.info/?l=bugtraq&m=142805027510172&w=2

http://marc.info/?l=bugtraq&m=142804214608580&w=2

http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

http://marc.info/?l=bugtraq&m=143039249603103&w=2

http://marc.info/?l=bugtraq&m=143101048219218&w=2

http://www.debian.org/security/2015/dsa-3253

https://www.elastic.co/blog/logstash-1-4-3-released

http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

http://rhn.redhat.com/errata/RHSA-2015-1545.html

http://rhn.redhat.com/errata/RHSA-2015-1546.html

https://support.apple.com/HT205217

http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html

http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681

http://www.vmware.com/security/advisories/VMSA-2015-0003.html

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

https://security.gentoo.org/glsa/201606-11

http://marc.info/?l=bugtraq&m=145983526810210&w=2

http://marc.info/?l=bugtraq&m=144101915224472&w=2

http://marc.info/?l=bugtraq&m=143558192010071&w=2

http://marc.info/?l=bugtraq&m=143290371927178&w=2

http://marc.info/?l=bugtraq&m=144251162130364&w=2

http://marc.info/?l=bugtraq&m=142962817202793&w=2

http://marc.info/?l=bugtraq&m=143290437727362&w=2

http://marc.info/?l=bugtraq&m=143628269912142&w=2

http://marc.info/?l=bugtraq&m=141628688425177&w=2

http://marc.info/?l=bugtraq&m=144294141001552&w=2

http://marc.info/?l=bugtraq&m=141577350823734&w=2

http://marc.info/?l=bugtraq&m=143290522027658&w=2

http://marc.info/?l=bugtraq&m=141620103726640&w=2

http://marc.info/?l=bugtraq&m=141576815022399&w=2

http://marc.info/?l=bugtraq&m=143558137709884&w=2

http://marc.info/?l=bugtraq&m=141577087123040&w=2

http://marc.info/?l=bugtraq&m=143290583027876&w=2

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635

http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html

http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html

https://support.lenovo.com/product_security/poodle

http://www.debian.org/security/2016/dsa-3489

http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html

http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034

https://support.lenovo.com/us/en/product_security/poodle

https://security.gentoo.org/glsa/201507-14

https://kc.mcafee.com/corporate/index?page=content&id=SB10104

https://kc.mcafee.com/corporate/index?page=content&id=SB10091

https://kc.mcafee.com/corporate/index?page=content&id=SB10090

http://www-01.ibm.com/support/docview.wss?uid=swg21692299

https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html

http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

https://security.netapp.com/advisory/ntap-20141015-0001/

https://support.citrix.com/article/CTX216642

https://puppet.com/security/cve/poodle-sslv3-vulnerability

https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02

https://github.com/mpgn/poodle-PoC

https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU

http://www.securityfocus.com/archive/1/533724/100/0/threaded

https://lists.apache.org/thread.html/[email protected]%3Ccommits.cxf.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.cxf.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.cxf.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.cxf.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.cxf.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.cxf.apache.org%3E

https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7

Details

Source: MITRE

Published: 2014-10-15

Updated: 2021-11-17

Type: CWE-310

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 3.4

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

Impact Score: 1.4

Exploitability Score: 1.6

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*

cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*

cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions up to 10.10.1 (inclusive)

Configuration 4

OR

cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*

cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*

cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*

cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*

cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*

cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*

cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*

Configuration 9

OR

cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*

Configuration 10

OR

cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*

cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 12

OR

cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*

Tenable Plugins

View all (204 total)

IDNameProductFamilySeverity
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
131662EulerOS 2.0 SP2 : openssl098e (EulerOS-SA-2019-2509)NessusHuawei Local Security Checks
high
127201NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)NessusNewStart CGSL Local Security Checks
critical
124903EulerOS Virtualization for ARM 64 3.0.1.0 : openssl (EulerOS-SA-2019-1400)NessusHuawei Local Security Checks
medium
700649Oracle Java SE 5 < Update 81 / 6 < Update 91 / 7 < Update 75 / 8 < Update 31 Multiple Vulnerabilities (January 2015 CPU) (POODLE)Nessus Network MonitorWeb Clients
critical
122432F5 Networks BIG-IP : TMM TLS virtual server vulnerability (K10065173) (POODLE)NessusF5 Networks Local Security Checks
medium
119959SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2014:1541-1) (POODLE)NessusSuSE Local Security Checks
low
119359RHEL 6 : node.js (RHSA-2015:1546) (POODLE)NessusRed Hat Local Security Checks
low
119358RHEL 6 : node.js (RHSA-2015:1545) (POODLE)NessusRed Hat Local Security Checks
low
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
107537Solaris 10 (sparc) : 142824-24 (POODLE)NessusSolaris Local Security Checks
low
105084Check Point Gaia Operating System SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (sk103683) (POODLE)NessusFirewalls
high
101836Oracle Database Multiple Vulnerabilities (July 2017 CPU) (POODLE) (SWEET32)NessusDatabases
critical
99297openSUSE Security Update : slrn (openSUSE-2017-459) (POODLE)NessusSuSE Local Security Checks
low
96363FreeBSD : lynx -- multiple vulnerabilities (03532a19-d68e-11e6-9171-14dae9d210b8) (POODLE)NessusFreeBSD Local Security Checks
high
95272openSUSE Security Update : monit (openSUSE-2016-1339) (POODLE)NessusSuSE Local Security Checks
medium
93767SUSE SLES12 Security Update : apache2-mod_nss (SUSE-SU-2016:2396-1) (POODLE)NessusSuSE Local Security Checks
critical
93590SUSE SLES11 Security Update : apache2-mod_nss (SUSE-SU-2016:2329-1) (POODLE)NessusSuSE Local Security Checks
low
93457SUSE SLES12 Security Update : apache2-mod_nss (SUSE-SU-2016:2285-1) (POODLE)NessusSuSE Local Security Checks
critical
91842GLSA-201606-11 : claws-mail: Multiple Vulnerabilities (POODLE)NessusGentoo Local Security Checks
high
91650SUSE SLES12 Security Update : cyrus-imapd (SUSE-SU-2016:1457-1) (POODLE)NessusSuSE Local Security Checks
low
91123SolarWinds Storage Resource Monitor Profiler < 6.2.3 Multiple Vulnerabilities (Logjam) (POODLE)NessusWindows
critical
90512IBM Domino SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)NessusWindows
medium
89651openSUSE Security Update : libopenssl0_9_8 (openSUSE-2016-294) (DROWN) (FREAK) (POODLE)NessusSuSE Local Security Checks
critical
88941Debian DSA-3489-1 : lighttpd - security update (POODLE)NessusDebian Local Security Checks
low
9081Apache Traffic Server 5.1.x < 5.1.1 Multiple Vulnerabilities (POODLE)Nessus Network MonitorWeb Servers
low
88107Debian DLA-400-1 : pound security update (BEAST) (POODLE)NessusDebian Local Security Checks
low
87324Xerox WorkCentre 3025 / 3215 / 3225 OpenSSL Multiple Vulnerabilities (XRX15AM) (FREAK) (POODLE)NessusMisc.
medium
87323Xerox WorkCentre 3550 OpenSSL Multiple Vulnerabilities (XRX15AJ) (FREAK) (POODLE)NessusMisc.
medium
87322Xerox ColorQube 92XX Multiple OpenSSL Vulnerabilities (XRX15AD) (FREAK) (GHOST) (POODLE)NessusMisc.
critical
86995SolarWinds DameWare Mini Remote Control < 12.0 Hotfix 2 SSLv3 Padding Oracle On Downgraded Legacy Encryption (POODLE)NessusWindows
medium
86410Fedora 22 : fossil-1.33-1.fc22 (2015-9110) (POODLE)NessusFedora Local Security Checks
medium
86409Fedora 21 : fossil-1.33-1.fc21 (2015-9090) (POODLE)NessusFedora Local Security Checks
medium
86245Apple Xcode < 7.0 (Mac OS X) (POODLE)NessusMacOS X Local Security Checks
high
85181HP System Management Homepage < 7.2.5 / 7.4.1 Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
84991Debian DLA-282-1 : lighttpd security update (POODLE)NessusDebian Local Security Checks
low
84719GLSA-201507-14 : Oracle JRE/JDK: Multiple vulnerabilities (POODLE)NessusGentoo Local Security Checks
low
84275AIX 6.1 TL 9 : nettcp (IV73976) (POODLE)NessusAIX Local Security Checks
medium
84274AIX 7.1 TL 3 : nettcp (IV73975) (POODLE)NessusAIX Local Security Checks
medium
84273AIX 7.1 TL 2 : nettcp (IV73974) (POODLE)NessusAIX Local Security Checks
medium
84272AIX 6.1 TL 8 : nettcp (IV73973) (POODLE)NessusAIX Local Security Checks
medium
84271AIX 7.1 TL 3 : nettcp (IV73419) (POODLE)NessusAIX Local Security Checks
medium
84270AIX 7.1 TL 2 : nettcp (IV73418) (POODLE)NessusAIX Local Security Checks
medium
84269AIX 6.1 TL 9 : nettcp (IV73417) (POODLE)NessusAIX Local Security Checks
medium
84268AIX 6.1 TL 8 : nettcp (IV73416) (POODLE)NessusAIX Local Security Checks
medium
84267AIX 6.1 TL 9 : nettcp (IV73324) (POODLE)NessusAIX Local Security Checks
medium
84266AIX 7.1 TL 2 : nettcp (IV73319) (POODLE)NessusAIX Local Security Checks
medium
84265AIX 7.1 TL 3 : nettcp (IV73316) (POODLE)NessusAIX Local Security Checks
medium
84264AIX 6.1 TL 8 : nettcp (IV69768) (POODLE)NessusAIX Local Security Checks
medium
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
83794FreeBSD : davmail -- fix potential CVE-2014-3566 vulnerability (POODLE) (384fc0b2-0144-11e5-8fda-002590263bf5) (POODLE)NessusFreeBSD Local Security Checks
low
83699SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2015:0503-1) (POODLE)NessusSuSE Local Security Checks
low
83648SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2014:1524-1) (POODLE)NessusSuSE Local Security Checks
low
83647SUSE SLED12 / SLES12 Security Update : compat-openssl098 (SUSE-SU-2014:1512-1) (POODLE)NessusSuSE Local Security Checks
low
83641SUSE SLES10 Security Update : OpenSSL (SUSE-SU-2014:1387-1) (POODLE)NessusSuSE Local Security Checks
low
83306Debian DSA-3253-1 : pound - security update (POODLE)NessusDebian Local Security Checks
low
83186VMware vCenter Server Multiple Java Vulnerabilities (VMSA-2015-0003) (POODLE)NessusMisc.
critical
83088Mac OS X : OS X Server < 4.1 Multiple Vulnerabilities (POODLE)NessusMacOS X Local Security Checks
medium
82902Oracle GlassFish Server Multiple Vulnerabilities (April 2015 CPU) (POODLE)NessusWeb Servers
high
82899VMware vCenter Chargeback Manager Multiple Java Vulnerabilities (VMSA-2015-0003) (POODLE)NessusWindows
critical
82822Oracle WebLogic Server Multiple Vulnerabilities (April 2015 CPU) (POODLE)NessusMisc.
medium
82742VMware Workspace Portal Multiple Java Vulnerabilities (VMSA-2015-0003) (POODLE)NessusMisc.
critical
82741VMware Horizon View Multiple Vulnerabilities (VMSA-2015-0003) (VMSA-2015-0008) (POODLE)NessusWindows
critical
82707VMware vCenter Operations Management Windows JRE Update 1.7.0_76-b13 (VMSA-2015-0003) (POODLE)NessusMisc.
critical
82706VMware vCenter Operations Management vApp JRE Update 1.7.0_76-b13 (VMSA-2015-0003) (POODLE)NessusMisc.
critical
82705VMware vCenter Operations Management Linux JRE Update 1.7.0_76-b13 (VMSA-2015-0003) (POODLE)NessusMisc.
critical
82684Mandriva Linux Security Advisory : java-1.8.0-openjdk (MDVSA-2015:198)NessusMandriva Local Security Checks
critical
82315Mandriva Linux Security Advisory : openssl (MDVSA-2015:062)NessusMandriva Local Security Checks
high
82140Debian DLA-157-1 : openjdk-6 security update (POODLE)NessusDebian Local Security Checks
low
81969RHEL 6 : rhevm-spice-client (RHSA-2015:0698) (POODLE)NessusRed Hat Local Security Checks
low
81825IBM WebSphere Application Server 7.0 < Fix Pack 37 Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
81784IBM Rational ClearQuest 7.1.x < 7.1.2.16 / 8.0.0.x < 8.0.0.13 / 8.0.1.x < 8.0.1.6 Multiple Vulnerabilities (credentialed check) (POODLE)NessusWindows
medium
81651Apache Tomcat 8.0.x < 8.0.15 Multiple Vulnerabilities (POODLE)NessusWeb Servers
high
81650Apache Tomcat 7.0.x < 7.0.57 Multiple Vulnerabilities (POODLE)NessusWeb Servers
high
81649Apache Tomcat 6.0.x < 6.0.43 Multiple Vulnerabilities (POODLE)NessusWeb Servers
high
81505RHEL 5 / 6 : Red Hat Satellite IBM Java Runtime (RHSA-2015:0264) (POODLE)NessusRed Hat Local Security Checks
low
81491AIX Java Advisory : java_feb2015_advisory.asc (POODLE)NessusAIX Local Security Checks
critical
81419SuSE 11.3 Security Update : java-1_7_0-openjdk (SAT Patch Number 10286)NessusSuSE Local Security Checks
critical
81401IBM WebSphere Application Server 8.0 < Fix Pack 10 Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
81326Amazon Linux AMI : java-1.6.0-openjdk (ALAS-2015-480) (POODLE)NessusAmazon Linux Local Security Checks
low
81146VMware Security Updates for vCenter Server (VMSA-2015-0001) (POODLE)NessusMisc.
medium
81141openSUSE Security Update : java-1_7_0-openjdk (openSUSE-SU-2015:0190-1) (POODLE)NessusSuSE Local Security Checks
low
81111Debian DSA-3147-1 : openjdk-6 - security update (POODLE)NessusDebian Local Security Checks
low
81090Debian DSA-3144-1 : openjdk-7 - security update (POODLE)NessusDebian Local Security Checks
low
81088Mac OS X Multiple Vulnerabilities (Security Update 2015-001) (POODLE)NessusMacOS X Local Security Checks
critical
81087Mac OS X 10.10.x < 10.10.2 Multiple Vulnerabilities (POODLE)NessusMacOS X Local Security Checks
critical
81085ESXi 5.5 < Build 2352327 Multiple Vulnerabilities (remote check) (POODLE)NessusMisc.
medium
81079VMSA-2015-0001 : VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues (POODLE)NessusVMware ESX Local Security Checks
low
81045Ubuntu 14.04 LTS / 14.10 : openjdk-7 vulnerabilities (USN-2487-1) (POODLE)NessusUbuntu Local Security Checks
low
81043Ubuntu 10.04 LTS / 12.04 LTS : openjdk-6 vulnerabilities (USN-2486-1) (POODLE)NessusUbuntu Local Security Checks
low
81015Scientific Linux Security Update : java-1.6.0-openjdk on SL5.x, SL6.x, SL7.x i386/x86_64 (20150126) (POODLE)NessusScientific Linux Local Security Checks
low
81014RHEL 5 / 6 / 7 : java-1.6.0-sun (RHSA-2015:0086) (POODLE)NessusRed Hat Local Security Checks
medium
81013RHEL 5 / 6 / 7 : java-1.6.0-openjdk (RHSA-2015:0085) (POODLE)NessusRed Hat Local Security Checks
low
81011Oracle Linux 5 / 6 / 7 : java-1.6.0-openjdk (ELSA-2015-0085) (POODLE)NessusOracle Linux Local Security Checks
low
81005CentOS 5 / 6 / 7 : java-1.6.0-openjdk (CESA-2015:0085) (POODLE)NessusCentOS Local Security Checks
low
80932RHEL 6 : java-1.8.0-oracle (RHSA-2015:0080) (POODLE)NessusRed Hat Local Security Checks
medium
80931RHEL 5 / 6 / 7 : java-1.7.0-oracle (RHSA-2015:0079) (POODLE)NessusRed Hat Local Security Checks
medium
80922Amazon Linux AMI : java-1.8.0-openjdk (ALAS-2015-472) (POODLE)NessusAmazon Linux Local Security Checks
low
80921Amazon Linux AMI : java-1.7.0-openjdk (ALAS-2015-471) (POODLE)NessusAmazon Linux Local Security Checks
low
80918Apache Traffic Server 5.1.x < 5.1.1 Multiple Vulnerabilities (POODLE)NessusWeb Servers
critical
80912Oracle Secure Global Desktop Multiple Vulnerabilities (January 2015 CPU) (POODLE)NessusMisc.
medium
80908Oracle Java SE Multiple Vulnerabilities (January 2015 CPU) (POODLE)NessusWindows
critical
80907Oracle Java SE Multiple Vulnerabilities (January 2015 CPU) (Unix) (POODLE)NessusMisc.
critical
80904Scientific Linux Security Update : java-1.8.0-openjdk on SL6.x i386/x86_64 (20150121) (POODLE)NessusScientific Linux Local Security Checks
low
80903Scientific Linux Security Update : java-1.7.0-openjdk on SL6.x, SL7.x i386/x86_64 (20150121) (POODLE)NessusScientific Linux Local Security Checks
low
80902Scientific Linux Security Update : java-1.7.0-openjdk on SL5.x i386/x86_64 (20150121) (POODLE)NessusScientific Linux Local Security Checks
low
80901Oracle Linux 6 : java-1.8.0-openjdk (ELSA-2015-0069) (POODLE)NessusOracle Linux Local Security Checks
low
80900Oracle Linux 5 : java-1.7.0-openjdk (ELSA-2015-0068) (POODLE)NessusOracle Linux Local Security Checks
low
80899Oracle Linux 6 / 7 : java-1.7.0-openjdk (ELSA-2015-0067) (POODLE)NessusOracle Linux Local Security Checks
low
80890Oracle JRockit R27.8.4 / R28.3.4 Multiple Vulnerabilities (January 2015 CPU) (POODLE)NessusWindows
medium
80885IBM General Parallel File System Multiple Vulnerabilities (Windows) (POODLE)NessusWindows
medium
80882RHEL 6 : java-1.8.0-openjdk (RHSA-2015:0069) (POODLE)NessusRed Hat Local Security Checks
low
80881RHEL 5 : java-1.7.0-openjdk (RHSA-2015:0068) (POODLE)NessusRed Hat Local Security Checks
medium
80880RHEL 6 / 7 : java-1.7.0-openjdk (RHSA-2015:0067) (POODLE)NessusRed Hat Local Security Checks
low
80870CentOS 6 : java-1.8.0-openjdk (CESA-2015:0069) (POODLE)NessusCentOS Local Security Checks
low
80869CentOS 5 : java-1.7.0-openjdk (CESA-2015:0068) (POODLE)NessusCentOS Local Security Checks
low
80868CentOS 6 / 7 : java-1.7.0-openjdk (CESA-2015:0067) (POODLE)NessusCentOS Local Security Checks
low
80725Oracle Solaris Third-Party Patch Update : openssl (multiple_vulnerabilities_in_openssl6) (POODLE)NessusSolaris Local Security Checks
medium
80398IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.4 Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
80390SuSE 11.3 Security Update : suseRegister (SAT Patch Number 10008)NessusSuSE Local Security Checks
medium
80362Fedora 19 : claws-mail-3.11.1-2.fc19 / claws-mail-plugins-3.11.1-1.fc19 / libetpan-1.6-1.fc19 (2014-14237) (POODLE)NessusFedora Local Security Checks
medium
80322Fedora 20 : mingw-openssl-1.0.1j-1.fc20 (2014-17587) (POODLE)NessusFedora Local Security Checks
medium
80319Fedora 21 : mingw-openssl-1.0.1j-1.fc21 (2014-17576) (POODLE)NessusFedora Local Security Checks
medium
79898Fedora 21 : libuv-0.10.29-1.fc21 / nodejs-0.10.33-1.fc21 (2014-15411) (POODLE)NessusFedora Local Security Checks
medium
79897Fedora 19 : libuv-0.10.29-1.fc19 / nodejs-0.10.33-1.fc19 (2014-15390) (POODLE)NessusFedora Local Security Checks
medium
79896Fedora 20 : libuv-0.10.29-1.fc20 / nodejs-0.10.33-1.fc20 (2014-15379) (POODLE)NessusFedora Local Security Checks
medium
79739SuSE 11.3 Security Update : pure-ftpd (SAT Patch Number 10004)NessusSuSE Local Security Checks
medium
79738SuSE 11.3 Security Update : compat-openssl097g (SAT Patch Number 10033)NessusSuSE Local Security Checks
medium
79723Splunk Enterprise 6.0.x < 6.0.7 Multiple Vulnerabilities (POODLE)NessusCGI abuses
medium
79721Splunk Enterprise 5.0.x < 5.0.11 Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
79719HP SiteScope SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)NessusCGI abuses
medium
79713Scientific Linux Security Update : nss, nss-util, and nss-softokn on SL5.x, SL6.x, SL7.x i386/x86_64 (20141202) (POODLE)NessusScientific Linux Local Security Checks
low
79695CentOS 5 / 6 / 7 : nss (CESA-2014:1948) (POODLE)NessusCentOS Local Security Checks
low
79690Cisco Wireless LAN Controllers 5500 Series (POODLE)NessusCISCO
medium
79685RHEL 5 / 6 / 7 : nss, nss-util, and nss-softokn (RHSA-2014:1948) (POODLE)NessusRed Hat Local Security Checks
low
79681Oracle Linux 5 / 6 / 7 : nss / nss-softokn / nss-util (ELSA-2014-1948) (POODLE)NessusOracle Linux Local Security Checks
low
79635SuSE 11.3 Security Update : IBM Java (SAT Patch Number 9999)NessusSuSE Local Security Checks
critical
79634SuSE 11.3 Security Update : IBM Java (SAT Patch Number 9992)NessusSuSE Local Security Checks
critical
79626AIX Java Advisory : java_oct2014_advisory.asc (POODLE)NessusAIX Local Security Checks
critical
79618SuSE 11.3 Security Update : evolution-data-server (SAT Patch Number 9969)NessusSuSE Local Security Checks
medium
79580CUPS < 2.0.1 SSLv3 Legacy Encryption Vulnerability (POODLE)NessusMisc.
medium
79556OracleVM 3.2 : xen (OVMSA-2014-0041) (POODLE)NessusOracleVM Local Security Checks
low
79555OracleVM 2.2 : openssl (OVMSA-2014-0040) (POODLE)NessusOracleVM Local Security Checks
high
79554OracleVM 3.2 : openssl (OVMSA-2014-0039) (POODLE)NessusOracleVM Local Security Checks
high
79553OracleVM 3.3 : xen (OVMSA-2014-0038) (POODLE)NessusOracleVM Local Security Checks
low
79552OracleVM 3.2 : ovs-agent (OVMSA-2014-0037) (POODLE)NessusOracleVM Local Security Checks
low
79547OracleVM 3.3 : openssl (OVMSA-2014-0032) (Heartbleed) (POODLE)NessusOracleVM Local Security Checks
high
79418GLSA-201411-10 : Asterisk: Multiple Vulnerabilities (POODLE)NessusGentoo Local Security Checks
low
79405Mandriva Linux Security Advisory : asterisk (MDVSA-2014:218)NessusMandriva Local Security Checks
medium
79379RHEL 6 : java-1.7.0-ibm (RHSA-2014:1882) (POODLE)NessusRed Hat Local Security Checks
low
79378RHEL 5 / 6 : java-1.5.0-ibm (RHSA-2014:1881) (POODLE)NessusRed Hat Local Security Checks
low
79377RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2014:1880) (POODLE)NessusRed Hat Local Security Checks
low
79352RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2014:1877) (POODLE)NessusRed Hat Local Security Checks
low
79351RHEL 5 : java-1.7.0-ibm (RHSA-2014:1876) (POODLE)NessusRed Hat Local Security Checks
medium
79332SuSE 11.3 Security Update : openwsman (SAT Patch Number 9902)NessusSuSE Local Security Checks
medium
79269openSUSE Security Update : openssl (openSUSE-SU-2014:1426-1) (POODLE)NessusSuSE Local Security Checks
low
79222openSUSE Security Update : libserf (openSUSE-SU-2014:1395-1) (POODLE)NessusSuSE Local Security Checks
low
79218Cisco Unified Communications Manager SSLv3 Information Disclosure (cisco-sa-20141015-poodle) (POODLE)NessusCISCO
medium
79106openSUSE Security Update : claws-mail (openSUSE-SU-2014:1384-1) (POODLE)NessusSuSE Local Security Checks
low
79097Fedora 20 : claws-mail-3.11.1-2.fc20 / claws-mail-plugins-3.11.1-1.fc20 / libetpan-1.6-1.fc20 (2014-14234) (POODLE)NessusFedora Local Security Checks
medium
79096Fedora 21 : claws-mail-3.11.1-2.fc21 / claws-mail-plugins-3.11.1-1.fc21 / libetpan-1.6-1.fc21 (2014-14217) (POODLE)NessusFedora Local Security Checks
medium
79060RHEL 6 : Storage Server (RHSA-2014:1692) (POODLE)NessusRed Hat Local Security Checks
low
78886SuSE 11.3 Security Update : OpenSSL (SAT Patch Number 9915)NessusSuSE Local Security Checks
high
78871Apple TV < 7.0.1 Multiple Vulnerabilities (POODLE)NessusMisc.
medium
78804Fedora 21 : asterisk-11.13.1-1.fc21 (2014-13399) (POODLE)NessusFedora Local Security Checks
medium
78799Fedora 21 : openssl-1.0.1j-1.fc21 (2014-12951) (POODLE)NessusFedora Local Security Checks
medium
78772AIX OpenSSL Advisory : openssl_advisory11.asc (POODLE)NessusAIX Local Security Checks
high
78750SSLv3 Padding Oracle On Downgraded Legacy Encryption in Cisco ASA Software (cisco-sa-20141015-poodle) (POODLE)NessusCISCO
medium
78733openSUSE Security Update : openssl (openSUSE-SU-2014:1331-1) (POODLE)NessusSuSE Local Security Checks
low
78677Mac OS X : Cisco AnyConnect Secure Mobility Client < 3.1(5187) (POODLE)NessusMacOS X Local Security Checks
medium
78676Cisco AnyConnect Secure Mobility Client < 3.1(5187) (POODLE)NessusWindows
medium
78665Mandriva Linux Security Advisory : openssl (MDVSA-2014:203)NessusMandriva Local Security Checks
high
78623Asterisk Information Disclosure (AST-2014-011) (POODLE)NessusMisc.
medium
78611FreeBSD : asterisk -- Asterisk Susceptibility to POODLE Vulnerability (76c7a0f5-5928-11e4-adc7-001999f8d30b) (POODLE)NessusFreeBSD Local Security Checks
low
8562Apple TV < 7.0.1 Multiple VulnerabilitiesNessus Network MonitorInternet Services
low
78601Mac OS X : OS X Server < 4.0 Multiple Vulnerabilities (POODLE)NessusMacOS X Local Security Checks
high
78600Mac OS X : OS X Server < 3.2.2 SSLv3 Information Disclosure (POODLE)NessusMacOS X Local Security Checks
medium
78599Mac OS X : OS X Server < 2.2.5 SSLv3 Information Disclosure (POODLE)NessusMacOS X Local Security Checks
medium
78585Apple iOS < 8.1 Multiple Vulnerabilities (POODLE)NessusMobile Devices
medium
78584stunnel < 5.06 OpenSSL Multiple Vulnerabilities (POODLE)NessusWindows
medium
78581Fedora 19 : openssl-1.0.1e-40.fc19 (2014-13012) (POODLE)NessusFedora Local Security Checks
medium
78575Fedora 20 : openssl-1.0.1e-40.fc20 (2014-13069) (POODLE)NessusFedora Local Security Checks
medium
78559Amazon Linux AMI : nss (ALAS-2014-429) (POODLE)NessusAmazon Linux Local Security Checks
low
78554OpenSSL 1.0.1 < 1.0.1j Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
78553OpenSSL 1.0.0 < 1.0.1o Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
78552OpenSSL 0.9.8 < 0.9.8zc Multiple Vulnerabilities (POODLE)NessusWeb Servers
medium
78551Mac OS X Multiple Vulnerabilities (Security Update 2014-005) (POODLE) (Shellshock)NessusMacOS X Local Security Checks
critical
78550Mac OS X < 10.10 Multiple Vulnerabilities (POODLE) (Shellshock)NessusMacOS X Local Security Checks
critical
78537Scientific Linux Security Update : openssl on SL6.x, SL7.x i386/x86_64 (20141016) (POODLE)NessusScientific Linux Local Security Checks
low
78536Scientific Linux Security Update : openssl on SL5.x i386/x86_64 (20141016) (POODLE)NessusScientific Linux Local Security Checks
low
78533RHEL 5 : openssl (RHSA-2014:1653) (POODLE)NessusRed Hat Local Security Checks
medium
78532RHEL 6 / 7 : openssl (RHSA-2014:1652) (POODLE)NessusRed Hat Local Security Checks
low
78530Oracle Linux 5 : openssl (ELSA-2014-1653) (POODLE)NessusOracle Linux Local Security Checks
low
78529Oracle Linux 6 / 7 : openssl (ELSA-2014-1652) (POODLE)NessusOracle Linux Local Security Checks
low
78520Debian DSA-3053-1 : openssl - security update (POODLE)NessusDebian Local Security Checks
low
78517CentOS 5 : openssl (CESA-2014:1653) (POODLE)NessusCentOS Local Security Checks
low
78516CentOS 6 / 7 : openssl (CESA-2014:1652)NessusCentOS Local Security Checks
high
8552OpenSSL < 0.9.8zc / < 1.0.0o / < 1.0.1j Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
78495FreeBSD : OpenSSL -- multiple vulnerabilities (03175e62-5494-11e4-9cc1-bc5ff4fb5e7b) (POODLE)NessusFreeBSD Local Security Checks
low
78484Amazon Linux AMI : openssl (ALAS-2014-426) (POODLE)NessusAmazon Linux Local Security Checks
low
78483Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : openssl (SSA:2014-288-01) (POODLE)NessusSlackware Local Security Checks
low
78479SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)NessusGeneral
medium
78447MS KB3009008: Vulnerability in SSL 3.0 Could Allow Information Disclosure (POODLE)NessusWindows
medium
77811IBM Domino 9.0.x < 9.0.1 Fix Pack 2 Multiple Vulnerabilities (credentialed check) (POODLE)NessusWindows
critical