CVE-2011-3389

Scores

EPSS

0.038very_low3.8%
0%20%40%60%80%100%

Percentile: 3.8%

CVSS

4.3medium2.0
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Description

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a “BEAST” attack.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdredhatubuntu

CWEs

CWE-326

Related Vulnerabilities

Exploits

Exploit ID: 10071

Source: exploitdb

URL: https://www.exploit-db.com/exploits/10071

Exploit ID: 10579

Source: exploitdb

URL: https://www.exploit-db.com/exploits/10579

Exploit ID: 12334

Source: exploitdb

URL: https://www.exploit-db.com/exploits/12334

Exploit ID: 24487

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24487

Exploit ID: 28726

Source: exploitdb

URL: https://www.exploit-db.com/exploits/28726

Exploit ID: 34427

Source: exploitdb

URL: https://www.exploit-db.com/exploits/34427

Exploit ID: 4773

Source: exploitdb

URL: https://www.exploit-db.com/exploits/4773

Exploit ID: 8720

Source: exploitdb

URL: https://www.exploit-db.com/exploits/8720

Exploit ID: CVE-2009-3555

Source: github-poc

URL: https://github.com/johnwchadwick/cve-2009-3555-test-server

Exploit ID: CVE-2014-3570

Source: github-poc

URL: https://github.com/uthrasri/CVE-2014-3570_G2.5_openssl_no_patch

Exploit ID: CVE-2014-8275

Source: github-poc

URL: https://github.com/uthrasri/CVE-2014-8275_openssl_g2.5

Exploit ID: CVE-2015-0205

Source: github-poc

URL: https://github.com/saurabh2088/OpenSSL_1_0_1g_CVE-2015-0205

Recommendations

Source: nvd

All cURL users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=net-misc/curl-7.24.0”

URL: http://security.gentoo.org/glsa/glsa-201203-02.xml

Source: nvd

Before applying this update, make sure all previously-released erratarelevant to your system have been applied.
This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2012-0508.html

Vulnerable Software (92)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:canonical:ubun...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:debian:debian_linux...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",          "versionEndExcluding": "15.0.874.102"        }      ],      "negate...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",          "versionEndExcluding": "7.24.0",          "versionStartIncluding": "7.10....

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",          "versionEndExcluding": "7"        }      ],      "neg...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:microsoft:windows:0:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"    }  ], ...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:mozilla:firefox:0:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"    }  ],  "...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",          "versionEndExcluding": "12"        }      ],      "negate": f...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:redhat:...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:redhat:e...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator"...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:red...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:h:siemens:simatic_rf615r:0:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"    } ...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "3.2.1"        }      ],  ...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:h:siemens:simatic_rf68xr:0:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"    } ...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*",          "versionEndExcluding": "3.2.1"        }      ],  ...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:oracle:java_se:*:*:*:*:*:*:*:*",          "versionEndExcluding": "1.4.2_34"        },        {          "cpe...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",          "versionEndExcluding": "1.4.2_34"        },        {          "cpe...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",          "versionEndExcluding": "R28.1.5"        }      ],      "negate": f...

Source: anchore_overrides