(Red Hat Issues Fix for JBoss) OpenSSL SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic
SecurityTracker Alert ID: 1031275|
SecurityTracker URL: http://securitytracker.com/id/1031275
(Links to External Site)
Date: Dec 2 2014
Disclosure of system information, Disclosure of user information|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes |
A vulnerability was reported in OpenSSL. A remote user can decrypt SSL sessions in certain cases. Red Hat JBoss is affected.|
A remote user can with the ability to conduct a man-in-the-middle attack can force a client to negotiate a downgrade to SSLv3 instead of a TLS v1.x protocol and then conduct a BEAST-style of attack to decrypt portions of the session.
This protocol vulnerability is referred to as the POODLE ("Padding Oracle On Downgraded Legacy Encryption") vulnerability.
This is a flaw in the protocol rather than in the OpenSSL implementation.
The original advisory is available at:
Bodo Moller, Thai Duong, and Krzysztof Kotowicz reported this vulnerability.
A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL sessions.|
Red Hat has issued a fix for JBoss.|
The Red Hat advisory is available at:
Vendor URL: www.openssl.org/ (Links to External Site)
Access control error|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [RHSA-2014:1920-01] Important: Red Hat JBoss Web Server 2.1.0 openssl security update|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Web Server 2.1.0 openssl security update
Advisory ID: RHSA-2014:1920-01
Product: Red Hat JBoss Web Server
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1920.html
Issue date: 2014-12-01
An update for the openssl component for Red Hat JBoss Web Server 2.1.0 that
provides a patch to mitigate the CVE-2014-3566 issue is now available from
the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having Important security
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector
(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat
This update adds support for the TLS Fallback Signaling Cipher Suite Value
(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade
attacks against applications which re-connect using a lower SSL/TLS
protocol version when the initial connection indicating the highest
supported protocol version fails.
This can prevent a forceful downgrade of the communication to SSL 3.0.
The SSL 3.0 protocol was found to be vulnerable to the padding oracle
attack when using block cipher suites in cipher block chaining (CBC) mode.
This issue is identified as CVE-2014-3566, and also known under the alias
POODLE. This SSL 3.0 protocol flaw will not be addressed in a future
update; it is recommended that users configure their applications to
require at least TLS protocol version 1.0 for secure communication.
For additional information about this flaw, see the Knowledgebase article
All users of Red Hat JBoss Web Server 2.1.0 as provided from the Red Hat
Customer Portal are advised to apply this update. The Red Hat JBoss Web
Server process must be restarted for the update to take effect.
The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing Red Hat JBoss Web Server installation (including all applications
and configuration files).
4. Bugs fixed (https://bugzilla.redhat.com/):
1152789 - CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
-----END PGP SIGNATURE-----
RHSA-announce mailing list