POODLE-Vulnerability/EN: Unterschied zwischen den Versionen
(3 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
− | === | + | |
+ | === {{:{{PAGENAME}}/Headline}} === | ||
+ | |||
+ | If the result is positive, there is no need for further action. If the result is negative, please read the following instructions. | ||
{| class="wikitable" | {| class="wikitable" | ||
− | |''' | + | |'''Result positive'''|| {{:{{PAGENAME}}/Positive}} |
+ | |- | ||
+ | |'''Result negativ'''|| {{:{{PAGENAME}}/Negative}} | ||
|- | |- | ||
|'''Description'''|| {{:{{PAGENAME}}/Description}} | |'''Description'''|| {{:{{PAGENAME}}/Description}} | ||
Zeile 14: | Zeile 19: | ||
− | [[Category:Siwecos-Scanner | + | [[Category:Siwecos-Scanner]] |
{{:{{PAGENAME}}/Category}} | {{:{{PAGENAME}}/Category}} |
Aktuelle Version vom 7. Mai 2020, 11:40 Uhr
Check for the POODLE vulnerability
If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.
Result positive | Not vulnerable to POODLE |
Result negativ | Vulnerable to POODLE |
Description | The server is vulnerable to a POODLE attack, which allows an attacker to decrypt the communication. |
Background | POODLE attack (Padding Oracle On Downgraded Legacy Encryption) is a serious security flaw in various internet protocols, whereby private data from clients and servers can be read via encrypted connections. |
Consequence | The server is vulnerable through a security flaw that allows an attacker to decrypt the communication. |
Solution/Tips | If vulnerability was reported, deactivate the outdated encryption protocol SSL3 on your server immediately! |