I should have written something back in Oct 2014...
Pegasus Mail with the distributed OpenSSL binaries is vulnerable to the POODLE attack -- in theory, in practice no.
While other protocols (e.g., HTTPS) are more likely to be exploited by an active man-in-the-middle to downgrade
connections to SSLv3, that is a near impossibility with email protocols (i.e., POP3S, SMTPS, IMAPS).
In a web setting, the SSLv3 weakness can be exploited by a MITM attacker who repeatedly re-crafts client requests
to the server. On average this effort requires 256 requests per byte of data.
One may "drop-in" updated OpenSSL binaries in-place of those distributed with Pegasus Mail.
However since Pegasus does not employ the TLS_FALLBACK_SCSV mechanism, an attacker
can still force a protocol "downgrade dance".
If one has a need to absolutely disable the SSLv3 protocol, I've compiled "openssl-1.0.2d-no-ssl23-win32-static-x86"
which has no SSLv2 or SSLv3 support.
http://www.guysalias.tk/misc/openssl/
(The file "openssl-1.0.2d-no-ssl23-win32-static-x86-tests.txt" shows SSLv2 and SSLv3 as unsupported,
TLSv1, TLSv1.1, and TLSv1.2 as supported cipher-suites).
<p>I should have written something back in Oct 2014...
Pegasus Mail with the distributed OpenSSL binaries is vulnerable to the POODLE attack -- in theory, in practice no.
While other protocols (e.g., HTTPS) are more likely to be exploited by an active man-in-the-middle to downgrade
connections to SSLv3, that is a near impossibility with email protocols (i.e., POP3S, SMTPS, IMAPS).
In a web setting, the SSLv3 weakness can be exploited by a MITM attacker who repeatedly re-crafts client requests
to the server. On average this effort requires 256 requests per byte of data.
One may "drop-in" updated OpenSSL binaries in-place of those distributed with Pegasus Mail.
However since Pegasus does not employ the TLS_FALLBACK_SCSV mechanism, an attacker
can still force a protocol "downgrade&nbsp;dance".
If one has a need to absolutely disable the SSLv3 protocol, I've compiled&nbsp; "openssl-1.0.2d-no-ssl23-win32-static-x86"
which has no SSLv2 or SSLv3 support.
<a href="http://www.guysalias.tk/misc/openssl/" title="OpenSSL Win32 Binaries" target="_blank" mce_href="http://www.guysalias.tk/misc/openssl/">http://www.guysalias.tk/misc/openssl/</a>
(The file "openssl-1.0.2d-no-ssl23-win32-static-x86-tests.txt" shows SSLv2 and SSLv3 as unsupported,
TLSv1, TLSv1.1, and TLSv1.2 as supported cipher-suites).</p><p>&nbsp;</p>