-
Bug
-
Resolution: Fixed
-
Medium
-
None
-
None
We can document how users can enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE.
- is incorporated by
-
CWD-4240 Upgrade tomcat to a version >= 7.0.55
-
- Closed
-
- relates to
-
CONFSERVER-35386 SSLv3 Is Not Disabled When sslProtocol is Set to TLS, Vulnerable to POODLE
-
- Closed
-
[CWD-4214] Disable SSLv3 in the commented out TLS tomcat configuration
Workflow | Original: Simplified Crowd Development Workflow v2 - restricted [ 1509795 ] | New: JAC Bug Workflow v3 [ 3363960 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Link | New: This issue relates to CONFCLOUD-35386 [ CONFCLOUD-35386 ] |
Workflow | Original: Simplified Crowd Development Workflow v2 [ 1392200 ] | New: Simplified Crowd Development Workflow v2 - restricted [ 1509795 ] |
Workflow | Original: Crowd Development Workflow v2 [ 792599 ] | New: Simplified Crowd Development Workflow v2 [ 1392200 ] |
Fix Version/s | New: 2.8.4 [ 54305 ] | |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Open [ 1 ] | New: Resolved [ 5 ] |
Labels | Original: no-cvss-required ssl | New: bootcamp no-cvss-required ssl |
Description | Original: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE. | New: We can document how users can enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE. |
Description | Original: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration so as to prevent customers being vulnerable to POODLE. | New: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE. |
Description | Original: We can document how users can re-enable SSLv3 but we should by disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE. | New: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration so as to prevent customers being vulnerable to POODLE. |
Summary | Original: Disable SSLv3 by in the commented out TLS tomcat configuration | New: Disable SSLv3 in the commented out TLS tomcat configuration |