Описание
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
hardy | DNE | |
lucid | not-affected | |
maverick | not-affected | |
natty | not-affected | |
oneiric | not-affected | |
precise | not-affected | |
quantal | not-affected | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
hardy | DNE | |
lucid | not-affected | |
maverick | DNE | |
natty | not-affected | |
oneiric | not-affected | |
precise | not-affected | |
quantal | not-affected | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | ignored | |
hardy | ignored | end of life |
lucid | ignored | |
maverick | ignored | |
natty | ignored | |
oneiric | ignored | |
precise | ignored | |
quantal | ignored | |
upstream | released | 1.4.30-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 6b23~pre11-1ubuntu2 |
hardy | released | 6b27-1.12.3-0ubuntu1~08.04.1 |
lucid | released | 6b20-1.9.10-0ubuntu1~10.04.2 |
maverick | released | 6b20-1.9.10-0ubuntu1~10.10.2 |
natty | released | 6b22-1.10.4-0ubuntu1~11.04.1 |
oneiric | released | 6b23~pre11-0ubuntu1.11.10 |
precise | not-affected | 6b23~pre11-1ubuntu2 |
quantal | not-affected | 6b23~pre11-1ubuntu2 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | released | 6b18-1.8.10-0ubuntu1~10.04.2 |
maverick | released | 6b18-1.8.10-0ubuntu1~10.10.2 |
natty | released | 6b18-1.8.10-0ubuntu1~11.04.1 |
oneiric | ignored | end of life |
precise | DNE | |
quantal | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 7~b147-2.0-1ubuntu1 |
hardy | DNE | |
lucid | DNE | |
maverick | DNE | |
natty | DNE | |
oneiric | released | 7~b147-2.0-0ubuntu0.11.10.1 |
precise | released | 7~b147-2.0-1ubuntu1 |
quantal | released | 7~b147-2.0-1ubuntu1 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | countermeasure in place |
hardy | not-affected | countermeasure in place |
lucid | not-affected | countermeasure in place |
maverick | not-affected | countermeasure in place |
natty | not-affected | countermeasure in place |
oneiric | not-affected | countermeasure in place |
precise | not-affected | countermeasure in place |
quantal | not-affected | countermeasure in place |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | ignored | end of life |
lucid | DNE | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | ignored | end of life |
lucid | DNE | removed from archive |
maverick | DNE | removed from archive |
natty | DNE | removed from archive |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
upstream | needs-triage |
Показывать по
4.3 Medium
CVSS2
Связанные уязвимости
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
The SSL protocol, as used in certain configurations in Microsoft Windo ...
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
4.3 Medium
CVSS2