The Poodle detection NVT:

http://plugins.openvas.org/nasl.php?oid=802087

checks for TLS_Fallback_SCSV, which is a fallback prevention for TLS1+
protocol that helps protect from downgrade attack that could enable POODLE
on TLS1+, except it seems to exit prematurely if TLS_Fallback_SCSV is
supported, even if SSLv3 is supported.

This looks as if TLS_Fallback_SCSV was treated as a remediation for POODLE
even on SSLv3, which it is not (it only helps for TLS1+).

The code in question is as follows:

## Vulnerable to POODLE attack if any CBC ciphers are supported
if (res == "SSLv3_SUPPORTED"){

  if( _check_tls_fallback_scsv() )
  {
    set_kb_item( name:"poodle_tls_fallback_scsv", value:TRUE );
    set_kb_item( name:"poodle_tls_fallback_scsv/port", value:ssl_port );
    exit( 99 );
  }

  security_message(ssl_port);
  exit( 0 );
}

Maybe the TLS_Fallback_SCSV kb item should be set elsewhere in the NVT and
not affect the result of this NVT ?
_______________________________________________
Openvas-plugins mailing list
Openvas-plugins@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to