Here is the official RedHat CVE for POODLE: https://access.redhat.com/security/cve/CVE-2014-3566
POODLE is pretty much a way to slowly decript a few bytes of a connection if it has been forced to use the SSLv3 protocol, however the big catch is it is a Man in the Middle attack, which means a portion of the network must already be compromised allowing someone to monitor, intercept and modify the packets. For example connecting to an unknown Wireless network where somone is filtering the packets.
The actual threat from POODLE is relatively low especially in our setting as our network is physically secure.
Once the OpenSSL patch has made its way down to the CentOS repo's we will install it, which is a stopgap meausre to help protect things but will not truly "fix" SSLv3. The only way to fix it is for both Client & Server's to stop using SSLv3 however we cannot fully disable SSLv3 at this time on cPanel servers.
You 'can' disable SSLv3 in Apache by visiting the Service Configuration > Apache Configuration -> Global Configuration page.
From here you can copy the current SSL Cipher Suite that they are using, and place i in the custom box. Simply add :-SSLv3 after the -SSLv2 entry in the Cipher suite. This will disable SSLv3 for Port 443. This will NOT disable SSLv3 for other services such as courier/dovecot, cpanel, webmail etc.
There "are" options within cPanel to be able to disable SSLv3 for these services, however doing so also disables TLS1.0 and 1.1 which will break SSL connections on those services for all browsers except those who support TLS1.2 (many more than just the SSLv3 browsers) so as it stands we do not recommend making any changes to any other SSL protocols except for the Cipher in apache.