Article ID: 123153, created on Oct 15, 2014, last review on Jun 17, 2016

  • Applies to:
  • Operations Automation
  • Plesk
  • Virtual Automation
  • H-Sphere


A CVE-2014-3566 vulnerability in SSLv3 protocol was identified by the Google security team. There is an additional whitepaper available from OpenSSL that also describes this vulnerability.

You can check if your website is vulnerable with curl:

curl -v3 -X HEAD

If you are NOT vulnerable, your output should look something like this:

curl: (35) SSL connect error

If you ARE vulnerable, you will see normal connection outputs, potentially including the line:

SSL 3.0 connection using ...


Although the possibility to exploit this vulnerability is quite low, the simplest way is to disable SSL 3.0 - this obsoleted protocol version is being used for compatibility needs and is not required for Parallels products.

For specific Parallels products, here is the list of articles which you may refer to:

Search Words


domain registration pending order





Отключение SSLv3 в шаблоне

I want to disable SSLv2 and SSLv3 for imap-ssl and pop3-ssl and STARTTLS(submission)

apache server.conf file


2897d76d56d2010f4e3a28f864d69223 e0aff7830fa22f92062ee4db78133079 caea8340e2d186a540518d08602aa065 198398b282069eaf2d94a6af87dcb3ff 614fd0b754f34d5efe9627f2057b8642 a914db3fdc7a53ddcfd1b2db8f5a1b9c 56797cefb1efc9130f7c48a7d1db0f0c 400e18f6ede9f8be5575a475d2d6b0a6 319940068c5fa20655215d590b7be29b 5356b422f65bdad1c3e9edca5d74a1ae f213b9fa8759d57bee5d547445806fe7 6311ae17c1ee52b36e68aaf4ad066387

Email subscription for changes to this article
Save as PDF