Updating ssl 2 0 to ssl 3 0
It splits the records into several parts and ensures none of them can be attacked.
However the problem of the splitting is that, though valid according to the specification, it may also cause compatibility issues due to problems in server-side implementations.
To mitigate the POODLE attack, one approach is to completely disable SSL 3.0 on the client side and the server side.
The POODLE attack (which stands for "Padding Oracle On Downgraded Legacy Encryption") is a man-in-the-middle exploit which takes advantage of Internet and security software clients' fallback to SSL 3.0.
If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages.
Bodo Möller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014 (despite the paper being dated "September 2014" POODLE exemplifies a vulnerability that succeeds thanks to a mechanism designed for reducing security for the sake of interoperability.
When designing systems in domains with high levels of fragmentation, then, extra care is appropriate.