CVE-2011-3389
CVSS V2 Medium 4.3
CVSS V3 None
Description
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Overview
- CVE ID
- CVE-2011-3389
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2011-09-06T19:55:03
- Last Modified Date
- 2022-11-29T15:56:08
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.2.1 | |
cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.2.1 | |
cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | 1 | OR | 7.10.6 | 7.23.1 |
AND | ||||
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | 1 | OR | ||
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2011-3389 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 15:53:15 | Added to TrackCVE | |||
2022-12-01 18:20:38 | 2022-11-29T15:56:08 | CVE Modified Date | updated | |
2022-12-01 18:20:38 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |