TLS-POODLE-Vulnerability/EN: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
Zeile 1: Zeile 1:
 
=== {{:{{PAGENAME}}/Headline}} ===
 
=== {{:{{PAGENAME}}/Headline}} ===
 +
 +
If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.
  
 
{| class="wikitable"
 
{| class="wikitable"
|'''Check'''|| {{:{{PAGENAME}}/Negative}}
+
|'''Result positive'''|| {{:{{PAGENAME}}/Positive}}
 +
|-
 +
|'''Result negativ'''|| {{:{{PAGENAME}}/Negative}}
 
|-
 
|-
 
|'''Description'''||  {{:{{PAGENAME}}/Description}}
 
|'''Description'''||  {{:{{PAGENAME}}/Description}}

Version vom 3. April 2019, 15:06 Uhr

Check for the TLS-POODLE vulnerability

If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.

Result positive Not vulnerable to TLS POODLE.
Result negativ Vulnerable to TLS POODLE.
Description The server is vulnerable to a variant of the POODLE attack on TLS, which allows an attacker to decrypt the communication.
Background There is a variant of the POODLE attack which also attacks newer TLS versions. This is possible due to an implementation error in the TLS servers.
Consequence The server is vulnerable through an vulnerability that allows an attacker to decrypt the communication.
Solution/Tips If vulnerability was reported, update the TLS implementation on your server immediately.