Just started failing PCI on a server for a poodle vulnerability for WHM and Cpanel ports, 2083 and 2087.
CVE's are:
2015-4078
2014-8730
2015-5369
This server has been running for years right now with very few changes. I don't see these when I grep the openssl changelog. Is there somewhere else I need to look to show these were patched or did I miss a big security issue with TLS 1.2? Kind of scratching my head on this one, none of my other servers are failing it...
Even though all servers are running identical operating systems and SSL/TLS and identical cipher implementations, the description from trustwave is:
Certain TLS implementations do not properly conform to the TLS RFC and support the CBC padding scheme from SSLv3. This could allow an attacker to exploit a padding-oracle and compromise the confidentiality of a TLS session.
CVE's are:
2015-4078
2014-8730
2015-5369
This server has been running for years right now with very few changes. I don't see these when I grep the openssl changelog. Is there somewhere else I need to look to show these were patched or did I miss a big security issue with TLS 1.2? Kind of scratching my head on this one, none of my other servers are failing it...
Even though all servers are running identical operating systems and SSL/TLS and identical cipher implementations, the description from trustwave is:
Certain TLS implementations do not properly conform to the TLS RFC and support the CBC padding scheme from SSLv3. This could allow an attacker to exploit a padding-oracle and compromise the confidentiality of a TLS session.
Last edited: