An attacker can then force a client's web browser to downgrade the encryption connection to SSLv3 or lower to exploit the vulnerability in these older versions of SSL.
An attacker will most likely use this vulnerability to steal session cookies to read a victim's email or access other Internet accounts.
Mitigations for system administratorsSystem administrators should configure their servers to not use SSLv3 or earlier. Servers accessible from the Internet can be checked using Qualys' SSL Server Test.
Servers that still require SSLv3 to operate with legacy systems should implement the TLS_FALLBACK_SCSV feature to prevent unnecessary protocol downgrades from happening.
Mitigations for end-usersEnd-users should keep their web browsers up to date. Patches will be available to disable SSLv3 or earlier soon. End-users that don't want to wait for patches can configure their web browsers to disable SSLv3 and earlier as follows.
Start the browser using the command-line flag: --ssl-version-min=tls1
Install the SSL Version Control extension:
Under about:config set security.tls.version.min to 1
Internet Explorer 6 does not support TLS. Users of Internet Explorer 6 should update to the latest version possible on their operating system.
To change the default protocol version to be used for HTTPS requests, perform the following steps:
- On the Internet Explorer Tools menu, click Internet Options.
- In the Internet Options dialog box, click the Advanced tab.
- In the Security category, uncheck Use SSL 3.0 and check Use TLS 1.0, Use TLS 1.1, and Use TLS 1.2 (if available).
- Click OK.
- Exit and restart Internet Explorer.