Menu
The POODLE flaw returns, this time hitting TLS security protocol

The POODLE flaw returns, this time hitting TLS security protocol

HTTPS website owners advised to check their websites again

Webmasters who patched their sites against a serious SSL flaw discovered in October will have to check them again. Researchers have discovered that the vulnerability also affects implementations of the newer TLS (Transport Layer Security) protocol.

The POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability allows attackers who manage to intercept traffic between a user's browser and an HTTPS (HTTP Secure) website to decrypt sensitive information, like the user's authentication cookies.

Initially, researchers believed it affected only SSL 3.0, an aging protocol superseded by TLS 1.0, 1.1. and 1.2. That still put users at risk, since most browsers and servers still supported SSL 3.0 for backward-compatibility reasons. Attackers were able to force a connection downgrade from TLS to SSL and then exploit the vulnerability.

Security researchers have now discovered that the issue also affects some implementations of TLS in products that don't properly check the structure of the "padding" used in TLS packets.

The problem was first observed in old versions of Mozilla's NSS (Network Security Services), the cryptographic library used in Firefox and other products, but Google security engineer Adam Langley built a scanner to find out if other products are affected.

He found that some major sites were vulnerable, and it turned out to be because they were using load balancers from F5 Networks and A10 Networks to handle the TLS connections.

"F5 have posted patches for their products and A10 should be releasing updates today," Langley said Monday in a blog post. "I'm not completely sure that I've found every affected vendor but, now that this issue is public, any other affected products should quickly come to light."

According to Ivan Ristic, who runs the SSL Labs at security vendor Qualys, about 10 percent of servers monitored by the SSL Pulse project are vulnerable to POODLE attacks through TLS. The SSL Pulse project monitors the HTTPS-enabled sites from the list of top 1 million most visited sites published by Internet statistics firm Alexa -- around 151,000 sites in November.

Website administrators who want to check if their servers -- or load balancers used in front of their servers -- are vulnerable, can use the Qualys SSL Labs server test, which has been updated to detect the problem.

"If vulnerable, apply the patch provided by your vendor," Ivan Ristic said in a blog post. "As problems go, this one should be easy to fix."


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securitypatch managementGoogleencryptionqualysF5 NetworkspatchesExploits / vulnerabilitiesA10 Networks

Featured

Slideshows

Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
Show Comments