Page tree

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Applies to VoipNow Professional 2.5 and VoipNow 3.0.0 - 3.0.5!

There seems to be a vulnerability in the SSLv3 protocol, which is described in CVE-2014-3566 (short name 'POODLE'). All implementations of SSLv3 are affected.

This vulnerability allows a man-in-the-middle attacker to decrypt SSL traffic. More details can be found here.

Step-by-step guide

To verify if you are vulnerable, please run:

  1. curl -v3 -X HEAD
  2. If you see "curl: (35) SSL connect error", then you are not vulnerable. If you have a normal SSL connection, this means you are vulnerable.

To avoid being exploited, please run:

  1. wget
  2. sh

Error rendering macro 'contentbylabel'

parameters should not be empty

#trackbackRdf ($trackbackUtils.getContentIdentifier($page) $page.title $trackbackUtils.getPingUrl($page))
  • No labels

Except where otherwise noted, content in this space is licensed under a Creative Commons Attribution 4.0 International.