4.3

CVE-2011-3389

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GoogleChrome Version-
MozillaFirefox Version-
OperaOpera Browser Version-
MicrosoftWindows Version-
SiemensSimatic Rf68xr Firmware Version < 3.2.1
   SiemensSimatic Rf68xr Version-
SiemensSimatic Rf615r Firmware Version < 3.2.1
   SiemensSimatic Rf615r Version-
HaxxCurl Version >= 7.10.6 <= 7.23.1
RedhatEnterprise Linux Eus Version6.2
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
CanonicalUbuntu Linux Version11.04
CanonicalUbuntu Linux Version11.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.51% 0.887
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-326 Inadequate Encryption Strength

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Third Party Advisory
US Government Resource
http://marc.info/?l=bugtraq&m=134254866602253&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=134254957702612&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=133728004526190&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://www.securityfocus.com/bid/49388
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1025997
Third Party Advisory
Broken Link
VDB Entry
http://eprint.iacr.org/2004/111
Third Party Advisory
http://eprint.iacr.org/2006/136
Third Party Advisory
http://marc.info/?l=bugtraq&m=132750579901589&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=132872385320240&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=133365109612558&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://www.kb.cert.org/vuls/id/864643
Third Party Advisory
US Government Resource
http://www.opera.com/support/kb/view/1004/
Third Party Advisory
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-1384.html
Third Party Advisory
Vendor Advisory
http://www.securityfocus.com/bid/49778
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029190
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1026103
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1026704
Third Party Advisory
Broken Link
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
Third Party Advisory
US Government Resource
https://bugzilla.novell.com/show_bug.cgi?id=719047
Third Party Advisory
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=737506
Third Party Advisory
Issue Tracking