SECURITY BITS: The “Poodle” attack and the end of SSLv3

Finally a good piece on the Poodle attack and the end of SSLv3 from on Mozilla Blog. The short version:

In late September, a team at Google discovered a serious vulnerability in SSL 3.0 that can be exploited to steal certain confidential information, such as cookies. This vulnerability, known as “POODLE”, is similar to the BEAST attack. By exploiting this vulnerability, an attacker can gain access to things like passwords and cookies, enabling him to access a user’s private account data on a website.

Any website that supports SSLv3 is vulnerable to POODLE, even if it also supports more recent versions of TLS. In particular, these servers are subject to a downgrade attack, in which the attacker tricks the browser into connecting with SSLv3. This relies on a behavior of browsers called insecure fallback, where browsers attempt to negotiate lower versions of TLS or SSL when connections fail.

 

Today, Firefox uses SSLv3 for only about 0.3% of HTTPS connections. That’s a small percentage, but due to the size of the Web, it still amounts to millions of transactions per day.

You can find all the information you need from a Mozilla perspective here:

The Mozilla Blog

One Reply to “SECURITY BITS: The “Poodle” attack and the end of SSLv3”

Leave a Reply

Your email address will not be published. Required fields are marked *