The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
No history.
Information
Published : 2011-09-06 19:55
Updated : 2022-11-29 15:56
NVD link : CVE-2011-3389
Mitre link : CVE-2011-3389
CVE.ORG link : CVE-2011-3389
JSON object : View
Products Affected
redhat
- enterprise_linux_server_aus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_workstation
microsoft
- windows
- internet_explorer
opera
- opera_browser
- chrome
siemens
- simatic_rf615r
- simatic_rf615r_firmware
- simatic_rf68xr
- simatic_rf68xr_firmware
canonical
- ubuntu_linux
debian
- debian_linux
haxx
- curl
mozilla
- firefox
CWE
CWE-326
Inadequate Encryption Strength
