Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-3389

Опубликовано: 06 сент. 2011
Источник: debian
EPSS Низкий

Описание

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sun-java6removedpackage
sun-java6no-dsalennypackage
sun-java6no-dsasqueezepackage
openjdk-6fixed6b23~pre11-1package
openjdk-7fixed7~b147-2.0-1package
iceweaselnot-affectedpackage
chromium-browserfixed15.0.874.106~r107270-1package
chromium-browserend-of-lifesqueezepackage
lighttpdfixed1.4.30-1package
curlfixed7.24.0-1package
python2.6fixed2.6.8-0.1package
python2.6no-dsasqueezepackage
python2.7fixed2.7.3~rc1-1package
python3.1unfixedpackage
python3.1no-dsasqueezepackage
python3.2fixed3.2.3~rc1-1package
cyasslremovedpackage
gnutls26removedpackage
gnutls28unfixedpackage
haskell-tlsunfixedpackage
matrixsslremovedpackage
matrixsslno-dsasqueezepackage
matrixsslno-dsawheezypackage
bouncycastlefixed1.49+dfsg-1package
bouncycastleno-dsasqueezepackage
bouncycastleno-dsawheezypackage
nssfixed3.13.1.with.ckbi.1.88-1package
polarsslunfixedpackage
tlsliteremovedpackage
tlsliteno-dsawheezypackage
poundfixed2.6-2package
erlangfixed1:15.b-dfsg-1package
erlangno-dsasqueezepackage
asteriskfixed1:13.7.2~dfsg-1package
asteriskfixed1:11.13.1~dfsg-2+deb8u1jessiepackage
asteriskno-dsawheezypackage
asteriskend-of-lifesqueezepackage

Примечания

  • http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/

  • strictly speaking this is no lighttpd issue, but lighttpd adds a workaround

  • http://curl.haxx.se/docs/adv_20120124B.html

  • http://bugs.python.org/issue13885

  • python3.1 is fixed starting 3.1.5

  • No mitigation for gnutls, it is recommended to use TLS 1.1 or 1.2 which is supported since 2.0.0

  • No mitigation for haskell-tls, it is recommended to use TLS 1.1, which is supported since 0.2

  • matrixssl fix this upstream in 3.2.2

  • No mitigation for bouncycastle, it is recommended to use TLS 1.1, which is supported since 1.4.9

  • https://bugzilla.mozilla.org/show_bug.cgi?id=665814

  • https://hg.mozilla.org/projects/nss/rev/7f7446fcc7ab

  • No mitigation for polarssl, it is recommended to use TLS 1.1, which is supported in all releases

  • Pound 2.6-2 added an anti_beast.patch to mitigate BEAST attacks.

  • http://downloads.digium.com/pub/security/AST-2016-001.html

  • https://issues.asterisk.org/jira/browse/ASTERISK-24972

  • patch for 11 (jessie): https://code.asterisk.org/code/changelog/asterisk?cs=f233bcd81d85626ce5bdd27b05bc95d131faf3e4

  • all versions vulnerable, backport required for wheezy

EPSS

Процентиль: 90%
0.05423
Низкий

Связанные уязвимости

ubuntu
почти 14 лет назад

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

redhat
почти 14 лет назад

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

nvd
почти 14 лет назад

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

github
около 3 лет назад

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

fstec
больше 13 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 90%
0.05423
Низкий