Last Updated: Fri Oct 24 14:00 CDT 2014
A significant vulnerability in the design of SSL version 3.0, commonly referred to as a POODLE attack (Padding Oracle On Downgraded Legacy Encryption), was announced on October 14, 2014.
Additional Details
Below are some links to external resources containing additional details on this vulnerability:
- Google Online Security Blog - http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
- Security Advisory paper - https://www.openssl.org/~bodo/ssl-poodle.pdf
- "Poodlebleed" website - http://poodlebleed.com/
- Adam Langley's ImperialViolet blog - https://www.imperialviolet.org/2014/10/14/poodle.html
- CVE:
External Resources (Updated)
Below are some links to external resources with more information on how to detect and possibly remediate this vulnerability:
- Apple - http://support.apple.com/kb/HT1222
- Support for SSL version 3.0 is still available but CBC cipher suites are now disabled when TLS connection attempts fail.
- Updates are available through Software Update or directly from Apple Support - http://support.apple.com/downloads/
- OS X Yosemite 10.10 - https://support.apple.com/kb/HT6535
- Security Update 2014-05 (OS X Mavericks 10.9.5 & OS X Mountain Lion 10.8.5) - https://support.apple.com/kb/HT6531 (Also includes contents of "OS X bash Update 1.0" for Bash Shellshock vulnerability)
- iOS 8.1 - http://support.apple.com/kb/HT6541
- Apple TV 7.0.1 - http://support.apple.com/kb/HT6542
- Server.app - available through the Mac App Store
- v4.0 (OS X Yosemite 10.10) - https://support.apple.com/kb/HT6536
- v3.2.2 (OS X Mavericks 10.9.5) - https://support.apple.com/kb/HT6527
- v2.2.5 (OS X Mountain Lion 10.8.5) - https://support.apple.com/kb/HT6529
- Apple Push Notification services (APNs) - https://developer.apple.com/news/?id=10222014a
- SSL 3.0 will be disabled on October 29, 2014
- Development environment is available for testing now
- Ubuntu - http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
- Red Hat - https://access.redhat.com/articles/1232123
- Microsoft - https://technet.microsoft.com/en-us/library/security/3009008.aspx
- Amazon Web Services security advisory - http://aws.amazon.com/security/security-bulletins/CVE-2014-3566-advisory/
- OpenSSL Security Advisory - https://www.openssl.org/news/secadv_20141015.txt
- SSL Labs client test - https://dev.ssllabs.com/ssltest/viewMyClient.html
- "Poodletest" website - http://poodletest.com/
JAMF Software Products and Services
- JAMF Software Server (JSS) version 9.6 or earlier specifies the use of TLS connections in the Apache Tomcat server configuration file (server.xml) but does not explicitly disable any other protocols, including SSL version 3.0.
- The jamf binary and client applications use the default SSL provided by the host operating system.
- JAMF Distribution Server (JDS) jamfds binary version 9.6 or earlier explicitly specifies the use of SSL version 3.0 for connections with the JSS and other JDS instances for replicating packages, but client connections use the SSL protocol(s) configured for Apache.
- JSS Conduit version 2.3 or earlier requires Java 7 on the system running the Conduit with any associated Plug-ins, including the JSS-to-JSS, SCCM Conduit Plug-in, Altiris Conduit Plug-in, and SIS Importer.
- JAMF Nation, JAMF Push Proxy, and JAMF Authorization Service have all been reconfigured to disable the use of SSL version 3.0.
- JAMF Cloud JSS Hosting service requires configuration changes that will be made during the next maintenance window, and JAMF Software will reach out to individual customers who may be affected.
- NetBoot/SUS Appliance OVA version 3.0.1 or earlier has not been fully tested, but it is likely that the web admin portion uses SSL version 3.0 as provided by Apache.
What JAMF Software is doing to fix this (Updated)
Casper Suite version 9.61 will include fixes to address the SSL version 3.0 POODLE vulnerability. The following is a brief summary of the changes:
- JAMF Software Server (JSS) version 9.61 default server.xml file now only supports Transport Layer Security (TLS) and disables support for SSL version 3.0. The existing server.xml file will be modified to only support TLS when upgrading the JSS on OS X and Linux, but manual changes will be required when upgrading the JSS on Windows (see Casper Suite Release Notes for more details).
- JAMF Distribution Server (JDS) jamfds binary version 9.61 now uses Transport Layer Security (TLS) instead of SSL version 3.0.
- JSS Conduit version 2.31 now uses Transport Layer Security (TLS) instead of SSL version 3.0, regardless of Java version on the system running the JSSConduit.jar.
As always, the Casper Suite Release Notes will include full details on what was fixed in version 9.61:
http://www.jamfsoftware.com/resources/resources-casper-suite/release-notes/
Check your email for the official product release announcement. Product downloads will be available through your JAMF Nation Account:
https://my.jamfsoftware.com/products.html
Best practices for upgrading the JSS are available in the "Preparing to Upgrade the JSS" Knowledge Base article on JAMF Nation:
https://jamfnation.jamfsoftware.com/article.html?id=136
What you might need to do to fix this
JAMF Software recommends following vendor recommendations for updating any affected systems, services, and applications. In addition, the following JAMF Nation Knowledge Base article provides a procedure for mitigating the SSL v3.0 POODLE vulnerability in case you are not able to upgrade to JSS version 9.61 right away:
https://jamfnation.jamfsoftware.com/article.html?id=382
Feel free to reach out to your Support representative through https://support.jamfsoftware.com/ with any questions, or bookmark this discussion post and check back for any available updates.
Thanks,
Jason Van Zanten
Product Specialist, Information Security
JAMF Software
