CVE-2011-3389
ADVISORY - debianSummary
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
- sun-java6 (bug https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645881) [lenny] - sun-java6 (Non-free not supported) [squeeze] - sun-java6 (Non-free not supported)
- openjdk-6 6b23~pre11-1
- openjdk-7 7~b147-2.0-1
- iceweasel (Vulnerable code not present) http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
- chromium-browser 15.0.874.106~r107270-1 [squeeze] - chromium-browser
- lighttpd 1.4.30-1 strictly speaking this is no lighttpd issue, but lighttpd adds a workaround
- curl 7.24.0-1 http://curl.haxx.se/docs/adv_20120124B.html
- python2.6 2.6.8-0.1 (bug https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684511) [squeeze] - python2.6 (Minor issue)
- python2.7 2.7.3~rc1-1
- python3.1 (bug https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678998) [squeeze] - python3.1 (Minor issue)
- python3.2 3.2.3~rc1-1 http://bugs.python.org/issue13885 python3.1 is fixed starting 3.1.5
- cyassl
- gnutls26 (unimportant)
- gnutls28 (unimportant) No mitigation for gnutls, it is recommended to use TLS 1.1 or 1.2 which is supported since 2.0.0
- haskell-tls (unimportant) No mitigation for haskell-tls, it is recommended to use TLS 1.1, which is supported since 0.2
- matrixssl (low) [squeeze] - matrixssl (Minor issue) [wheezy] - matrixssl (Minor issue) matrixssl fix this upstream in 3.2.2
- bouncycastle 1.49+dfsg-1 [squeeze] - bouncycastle (Minor issue) [wheezy] - bouncycastle (Minor issue) No mitigation for bouncycastle, it is recommended to use TLS 1.1, which is supported since 1.4.9
- nss 3.13.1.with.ckbi.1.88-1 https://bugzilla.mozilla.org/show_bug.cgi?id=665814 https://hg.mozilla.org/projects/nss/rev/7f7446fcc7ab
- polarssl (unimportant) No mitigation for polarssl, it is recommended to use TLS 1.1, which is supported in all releases
- tlslite [wheezy] - tlslite (Minor issue)
- pound 2.6-2 Pound 2.6-2 added an anti_beast.patch to mitigate BEAST attacks.
- erlang 1:15.b-dfsg-1 [squeeze] - erlang (Minor issue)
- asterisk 1:13.7.2dfsg-1 [jessie] - asterisk 1:11.13.1dfsg-2+deb8u1 [wheezy] - asterisk (Minor issue) [squeeze] - asterisk (Not supported in Squeeze LTS) http://downloads.digium.com/pub/security/AST-2016-001.html https://issues.asterisk.org/jira/browse/ASTERISK-24972 patch for 11 (jessie): https://code.asterisk.org/code/changelog/asterisk?cs=f233bcd81d85626ce5bdd27b05bc95d131faf3e4 all versions vulnerable, backport required for wheezy
EPSS Score: 0.05423 (0.897)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Inadequate Encryption Strength
Debian
CREATED
UPDATED
ADVISORY IDCVE-2011-3389
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AlowPackage | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
debian/gnutls28 | deb | debian | 12 | >=3.7.9-2+deb12u4 | Not yet available |
debian/asterisk | deb | debian | 11 | <1:13.7.2~dfsg-1 | 1:13.7.2~dfsg-1 |
debian/asterisk | deb | debian | unstable | <1:13.7.2~dfsg-1 | 1:13.7.2~dfsg-1 |
debian/bouncycastle | deb | debian | 12 | <1.49+dfsg-1 | 1.49+dfsg-1 |
debian/bouncycastle | deb | debian | 13 | <1.49+dfsg-1 | 1.49+dfsg-1 |
debian/bouncycastle | deb | debian | 11 | <1.49+dfsg-1 | 1.49+dfsg-1 |
debian/bouncycastle | deb | debian | unstable | <1.49+dfsg-1 | 1.49+dfsg-1 |
debian/curl | deb | debian | 13 | <7.24.0-1 | 7.24.0-1 |
debian/curl | deb | debian | 12 | <7.24.0-1 | 7.24.0-1 |
debian/curl | deb | debian | unstable | <7.24.0-1 | 7.24.0-1 |
debian/curl | deb | debian | 11 | <7.24.0-1 | 7.24.0-1 |
debian/erlang | deb | debian | 12 | <1:15.b-dfsg-1 | 1:15.b-dfsg-1 |
debian/erlang | deb | debian | 13 | <1:15.b-dfsg-1 | 1:15.b-dfsg-1 |
debian/erlang | deb | debian | 11 | <1:15.b-dfsg-1 | 1:15.b-dfsg-1 |
debian/erlang | deb | debian | unstable | <1:15.b-dfsg-1 | 1:15.b-dfsg-1 |
debian/gnutls28 | deb | debian | 11 | >=3.7.1-5+deb11u5 | Not yet available |
debian/gnutls28 | deb | debian | unstable | >=3.8.9-3 | Not yet available |
debian/gnutls28 | deb | debian | 13 | >=3.8.9-3 | Not yet available |
debian/haskell-tls | deb | debian | 13 | >=1.8.0-1 | Not yet available |
debian/haskell-tls | deb | debian | 12 | >=1.5.8-1 | Not yet available |
debian/haskell-tls | deb | debian | unstable | >=1.8.0-1 | Not yet available |
debian/haskell-tls | deb | debian | 11 | >=1.5.4-1 | Not yet available |
debian/lighttpd | deb | debian | 11 | <1.4.30-1 | 1.4.30-1 |
debian/lighttpd | deb | debian | unstable | <1.4.30-1 | 1.4.30-1 |
debian/lighttpd | deb | debian | 13 | <1.4.30-1 | 1.4.30-1 |
debian/lighttpd | deb | debian | 12 | <1.4.30-1 | 1.4.30-1 |
debian/nss | deb | debian | 11 | <3.13.1.with.ckbi.1.88-1 | 3.13.1.with.ckbi.1.88-1 |
debian/nss | deb | debian | 13 | <3.13.1.with.ckbi.1.88-1 | 3.13.1.with.ckbi.1.88-1 |
debian/nss | deb | debian | unstable | <3.13.1.with.ckbi.1.88-1 | 3.13.1.with.ckbi.1.88-1 |
debian/nss | deb | debian | 12 | <3.13.1.with.ckbi.1.88-1 | 3.13.1.with.ckbi.1.88-1 |
debian/pound | deb | debian | 11 | <2.6-2 | 2.6-2 |
debian/pound | deb | debian | 13 | <2.6-2 | 2.6-2 |
debian/pound | deb | debian | unstable | <2.6-2 | 2.6-2 |
debian/python2.7 | deb | debian | 11 | <2.7.3~rc1-1 | 2.7.3~rc1-1 |
Severity and metrics
No CVSS data available from this advisory.
Docker
CREATED
UPDATED
ADVISORY ID
CVE-2011-3389
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
NIST
CREATED
UPDATED
ADVISORY IDCVE-2011-3389
EXPLOITABILITY SCORE
8.6
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
4.3mediumUbuntu
CREATED
UPDATED
ADVISORY IDCVE-2011-3389
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AlowAmazon
CREATED
UPDATED
ADVISORY IDALAS-2011-10
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AcriticalRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2011-3389
EXPLOITABILITY SCORE
8.6
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
4.3mediumOracle
CREATED
UPDATED
ADVISORY IDELSA-2011-1380
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AcriticalChainguard
CREATED
UPDATED
ADVISORY ID
CGA-jx3g-34f8-cg42
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
Chainguard
CREATED
UPDATED
ADVISORY ID
CGA-m3vx-v2q7-5ghm
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
intheWild
CREATED
UPDATED
ADVISORY IDCVE-2011-3389
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-