This POODLE bites: exploiting the SSL 3.0 fallback

October 14, 2014 – 7:45 PM

Today we are publishing details of a vulnerability in the design of SSL version 3.0. This vulnerability allows the plaintext of secure connections to be calculated by a network attacker. I discovered this issue in collaboration with Thai Duong and Krzysztof Kotowicz (also Googlers).

SSL 3.0 is nearly 15 years old, but support for it remains widespread. Most importantly, nearly all browsers support it and, in order to work around bugs in HTTPS servers, browsers will retry failed connections with older protocol versions, including SSL 3.0. Because a network attacker can cause connection failures, they can trigger the use of SSL 3.0 and then exploit this issue.

Disabling SSL 3.0 support, or CBC-mode ciphers with SSL 3.0, is sufficient to mitigate this issue, but presents significant compatibility problems, even today. Therefore our recommended response is to support TLS_FALLBACK_SCSV. This is a mechanism that solves the problems caused by retrying failed connections and thus prevents attackers from inducing browsers to use SSL 3.0. It also prevents downgrades from TLS 1.2 to 1.1 or 1.0 and so may help prevent future attacks.

Google Chrome and our servers have supported TLS_FALLBACK_SCSV since February and thus we have good evidence that it can be used without compatibility problems. Additionally, Google Chrome will begin testing changes today that disable the fallback to SSL 3.0. This change will break some sites and those sites will need to be updated quickly.

In the coming months, we hope to remove support for SSL 3.0 completely from our client products.


  1. One Response to “This POODLE bites: exploiting the SSL 3.0 fallback”

  2. Clients can disable SSLv3 support locally and prevent these attacks:

    Launch via command line and use the –ssl-version-min=tls1 argument.

    Go into about:config and set security.tls.version.min to 1

    Internet Options -> Advanced Tab -> Uncheck “SSLv3” under “Security”. (I think it’s still there…Windows users can correct me if I’m wrong)

    By manunkind on Oct 14, 2014

You must be logged in to post a comment.