The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-154-1 | nss security update |
Debian DLA |
DLA-400-1 | pound security update |
Debian DSA |
DSA-2356-1 | openjdk-6 security update |
Debian DSA |
DSA-2358-1 | openjdk-6 security update |
Debian DSA |
DSA-2368-1 | lighttpd security update |
Debian DSA |
DSA-2398-1 | curl security update |
Debian DSA |
DSA-2398-2 | curl regression |
EUVD |
EUVD-2011-3352 | The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. |
Ubuntu USN |
USN-1263-1 | IcedTea-Web, OpenJDK 6 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T23:29:56.878Z
Reserved: 2011-09-05T00:00:00
Link: CVE-2011-3389
No data.
Status : Deferred
Published: 2011-09-06T19:55:03.197
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-3389
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN