TLS-POODLE-Vulnerability-IMAPS/EN: Unterschied zwischen den Versionen
(Die Seite wurde neu angelegt: „=== {{:{{PAGENAME}}/Headline}} === If the result is positive, there is no need for further action. If the result is negative, please read the following inst…“) |
|||
Zeile 1: | Zeile 1: | ||
+ | |||
=== {{:{{PAGENAME}}/Headline}} === | === {{:{{PAGENAME}}/Headline}} === | ||
Aktuelle Version vom 7. Mai 2020, 11:40 Uhr
Check for TLS-POODLE vulnerability
If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.
Result positive | Not vulnerable to TLS-POODLE. |
Result negativ | Vulnerable to TLS-POODLE. |
Description | The server is vulnerable to a variant of the Poodle attack on TLS, which allows an attacker to decrypt the communication. |
Background | There is a variant of the POODLE attack which also attacks newer TLS versions. This is possible due to an implementation error in the TLS servers. |
Consequence | The server is vulnerable to a vulnerability that allows an attacker to decrypt the communication. |
Solution/Tips | If vulnerability has been reported, immediately install an update to your TLS implementation on your server. |