Details and where I ripped most of this from is at: http://askubuntu.com/a/537197
Another reference with detailed explanation of the vulnerability: http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability
See if the server is vulnerable:
openssl s_client -connect <server>:<port> -ssl3
If it connects you are vulnerable. If safe, it will respond with handshake failure.
If you're running Apache, just include the following line in your configuration among the other SSL directives:
SSLProtocol All -SSLv2 -SSLv3
Then check if the new configuration is correct (no typos etc.):
apachectl configtest
And restart the server, e.g.
sudo service apache2 restart
If you're running Nginx, just include the following line in your configuration among the other SSL directives:
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
And restart the server, e.g.
sudo service nginx restart
Require constants and then disable SSLv3 in the server create. See example at https://gist.github.com/3rd-Eden/715522f6950044da45d8