How to secure your browser against POODLE vulnerability.

On October 14, 2014 Google has discovered a vulnerability in SSL V3.0 called POODLE that allows an attacker to capture encrypted data in plain text using man-in-the-middle attack. To protect your browser from the bug, you should disable SSL V3.0 support in your browser. Follow the instructions below to accomplish that.

Mozilla Firefox:

  1. Type “about:config in your address bar.
  2. A warning message may show up, click on the button “I’ll be careful, I promise”.
  3. Type “security.tls.version.min in the search box.
  4. Double click on the first result and change the value from 0 to 1.
  5. Restart Firefox.


Chrome:

Chrome doesn’t have direct option in its GUI to disable SSL V3.0, but fortunately there is another way.

  1. Right click on chrome shortcut and click properties.
  2. Under the general tab, put the following in the target box “--ssl-version-min=tls1”.
  3. Save and restart Chrome.


Internet Explorer:

  1. Open settings, internet options.
  2. Click on the Advanced tab.
  3. Scroll down until you find “Use SSL 3.0 under the security category.
  4. Uncheck it. Apply settings and restart IE.


To check if SSL V3.0 was removed correctly from your browser, visit this link https://zmap.io/sslv3/
If your browser still supports SSL V3.0, you'll see a warning message in red. Otherwise, you are safe.


To secure your servers against the POODLE vulnerability click here.

  • 77 Users Found This Useful
Was this answer helpful?

Related Articles

Disable SSH Password Authentication on Server.

It is recommended to disable SSH password authentication on your server to enhance security once...

Secure your servers against POODLE vulnerability for cPanel servers.

On October 14, 2014 Google has discovered a vulnerability in SSL V3.0 called POODLE that allows...

Secure your servers against POODLE vulnerability for cPanel servers.

On October 14, 2014 Google has discovered a vulnerability in SSL V3.0 called POODLE that allows...

Shellshock Bash Bug Vulnerability Patching and Checking

A newly discovered bug allows attackers to cause vulnerable versions of Bash to execute arbitrary...

Limit Access to Specific IPs on Server

We are going to use the CSF to limit access of some ports to a certain IP. Make sure to have a...

Powered by WHMCompleteSolution