Vulnerability Details : CVE-2011-3389
Public exploit exists!
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Products affected by CVE-2011-3389
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Threat overview for CVE-2011-3389
Top countries where our scanners detected CVE-2011-3389
Top open port discovered on systems with this issue
8200
IPs affected by CVE-2011-3389 250
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-3389!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-3389
1.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2011-3389
-
SSL/TLS Version Detection
Disclosure Date: 2014-10-14First seen: 2022-12-23auxiliary/scanner/ssl/ssl_versionCheck if a server supports a given version of SSL/TLS and cipher suites. The certificate is stored in loot, and any known vulnerabilities against that SSL version and cipher suite combination are checked. These checks include POODLE, deprecated protocols, expired/no
CVSS scores for CVE-2011-3389
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2011-3389
-
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3389
-
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
Apple - Lists.apple.comBroken Link;Mailing List
-
http://www.insecure.cl/Beast-SSL.rar
insecure.clBroken Link;Patch
-
http://eprint.iacr.org/2004/111
Cryptology ePrint Archive: Report 2004/111 - The Vulnerability of SSL to Chosen Plaintext AttackThird Party Advisory
-
http://www.opera.com/docs/changelogs/mac/1160/
How can we help you? - Opera HelpThird Party Advisory
-
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
Apple - Lists.apple.comBroken Link;Mailing List
-
http://secunia.com/advisories/48256
Sign inNot Applicable
-
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
mandriva.comBroken Link
-
http://www.securitytracker.com/id?1026103
Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://www.opera.com/docs/changelogs/mac/1151/
How can we help you? - Opera HelpThird Party Advisory
-
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
ImperialViolet - Chrome and the BEASTThird Party Advisory
-
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Philips Intellispace Portal ISP Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
Apple - Lists.apple.comBroken Link;Mailing List
-
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
Oracle Java Critical Patch Update - October 2011Third Party Advisory
-
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
InfoSec Handlers Diary Blog - SSL/TLS (part 3)Third Party Advisory
-
http://support.apple.com/kb/HT5281
About the security content of OS X Lion v10.7.4 and Security Update 2012-002 - Apple SupportBroken Link
-
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
Microsoft releases Security Advisory 2588513 – Microsoft Security Response CenterThird Party Advisory
-
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Third Party Advisory
-
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
Attack against TLS-protected communications | Mozilla Security BlogThird Party Advisory
-
http://www.opera.com/docs/changelogs/windows/1151/
How can we help you? - Opera HelpThird Party Advisory
-
https://bugzilla.novell.com/show_bug.cgi?id=719047
Bug 719047 – VUL-1: Adaptive chosen plaintext attack against SSL (BEAST Attack)Issue Tracking;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-1263-1
USN-1263-1: IcedTea-Web, OpenJDK 6 vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
Microsoft Updates for Multiple Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://www.redhat.com/support/errata/RHSA-2011-1384.html
SupportThird Party Advisory;Vendor Advisory
-
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
Apple - Lists.apple.comBroken Link
-
http://www.securitytracker.com/id/1029190
Oracle Fusion Middleware Flaws Let Remote Users Deny Service and Partially Access and Modify Data - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
HP Support for Technical Help and Troubleshooting | HP® Customer Service.Broken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
Repository / Oval RepositoryThird Party Advisory
-
http://vnhacker.blogspot.com/2011/09/beast.html
BEASTThird Party Advisory
-
http://marc.info/?l=bugtraq&m=134254957702612&w=2
'[security bulletin] HPSBMU02797 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.1x Running JD' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
Security impact of the Rizzo/Duong CBC "BEAST" attack - Educated GuessworkBroken Link
-
http://rhn.redhat.com/errata/RHSA-2013-1455.html
RHSA-2013:1455 - Security Advisory - Red Hat Customer PortalBroken Link
-
http://marc.info/?l=bugtraq&m=132872385320240&w=2
'[security bulletin] HPSBMU02742 SSRT100740 rev.1 - HP System Management Homepage (SMH) for Linux and' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
https://hermes.opensuse.org/messages/13155432
openSUSE.org - 503Broken Link
-
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Oracle Critical Patch Update - January 2015Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
[security-announce] openSUSE-SU-2020:0086-1: important: Security updateBroken Link
-
http://support.apple.com/kb/HT5001
About the security content of Apple TV Software Update 4.4 - Apple SupportThird Party Advisory
-
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
Is SSL broken? – More about Security Bulletin MS12-006 (previously known as Security Advisory 2588513) – Microsoft Security Response CenterThird Party Advisory
-
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
Multiple vulnerabilities in fetchmail | Oracle Third Party Vulnerability Resolution BlogThird Party Advisory
-
http://www.securityfocus.com/bid/49778
SSL/TLS Protocol Initialization Vector Implementation Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2012/dsa-2398
Debian -- Security Information -- DSA-2398-2 curlThird Party Advisory
-
http://marc.info/?l=bugtraq&m=133365109612558&w=2
'[security bulletin] HPSBUX02760 SSRT100805 rev.1 - HP-UX Running Java, Remote Unauthorized Access, D' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=132750579901589&w=2
'[security bulletin] HPSBUX02730 SSRT100710 rev.1 - HP-UX Running Java, Remote Unauthorized Access, D' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
https://hermes.opensuse.org/messages/13154861
openSUSE.org - 503Broken Link
-
http://www.securitytracker.com/id?1026704
IBM WebSphere DataPower Lets Remote Users Decrypt SSL/TLS Traffic - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
The Opera Blog - News | OperaThird Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
Third Party Advisory
-
http://www.opera.com/support/kb/view/1004/
Welcome - Opera Security CornerThird Party Advisory;Vendor Advisory
-
http://www.opera.com/docs/changelogs/unix/1160/
How can we help you? - Opera HelpThird Party Advisory
-
http://secunia.com/advisories/47998
Sign inNot Applicable
-
http://www.opera.com/docs/changelogs/windows/1160/
How can we help you? - Opera HelpThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Oracle Critical Patch Update - July 2015Third Party Advisory
-
http://www.ibm.com/developerworks/java/jdk/alerts/
Security Vulnerabilities - Java SDKThird Party Advisory
-
http://eprint.iacr.org/2006/136
Cryptology ePrint Archive: Report 2006/136 - A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSLThird Party Advisory
-
http://www.opera.com/docs/changelogs/unix/1151/
How can we help you? - Opera HelpThird Party Advisory
-
http://security.gentoo.org/glsa/glsa-201203-02.xml
cURL: Multiple vulnerabilities (GLSA 201203-02) — Gentoo securityThird Party Advisory
-
http://technet.microsoft.com/security/advisory/2588513
Microsoft Security Advisory 2588513 | Microsoft DocsPatch;Vendor Advisory
-
http://support.apple.com/kb/HT6150
About the security content of OS X Mavericks v10.9.2 and Security Update 2014-001 - Apple SupportThird Party Advisory
-
http://www.kb.cert.org/vuls/id/864643
VU#864643 - SSL 3.0 and TLS 1.0 allow chosen plaintext attack in CBC modesThird Party Advisory;US Government Resource
-
http://ekoparty.org/2011/juliano-rizzo.php
ekoparty security conferenceBroken Link
-
http://rhn.redhat.com/errata/RHSA-2012-0508.html
RHSA-2012:0508 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
Chrome Releases: Chrome Stable ReleaseNot Applicable;Vendor Advisory
-
http://support.apple.com/kb/HT5501
About the security content of OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 - Apple SupportThird Party Advisory
-
http://marc.info/?l=bugtraq&m=133728004526190&w=2
'[security bulletin] HPSBUX02777 SSRT100854 rev.1 - HP-UX Running Java JRE and JDK, Remote Denial' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
http://support.apple.com/kb/HT5130
About the security content of OS X Lion v10.7.3 and Security Update 2012-001 - Apple SupportThird Party Advisory
-
http://curl.haxx.se/docs/adv_20120124B.html
curl - SSL CBC IV vulnerability - CVE-2011-3389Third Party Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
Microsoft Security Bulletin MS12-006 - Important | Microsoft DocsPatch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=134254866602253&w=2
'[security bulletin] HPSBMU02799 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.0x Running JD' - MARCIssue Tracking;Mailing List;Third Party Advisory
-
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
Apple - Lists.apple.comBroken Link
-
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
Apple - Lists.apple.comBroken Link;Mailing List
-
http://support.apple.com/kb/HT4999
About the security content of iOS 5 Software Update - Apple SupportThird Party Advisory
-
http://www.securitytracker.com/id?1025997
Opera Lets Remote Users Spoof Extended Validation Address Bar Security Information and Decrypt SSL/TLS Traffic - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
[security-announce] SUSE-SU-2012:0114-1: important: Security update forBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
[security-announce] SUSE-SU-2012:0602-1: important: Security update forBroken Link
-
http://downloads.asterisk.org/pub/security/AST-2016-001.html
AST-2016-001Third Party Advisory
-
http://www.securityfocus.com/bid/49388
Opera Web Browser Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=737506
737506 – (BEAST, CVE-2011-3389) CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)Issue Tracking;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
[security-announce] SUSE-SU-2012:0122-1: important: Security update forBroken Link
-
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Apple - Lists.apple.comBroken Link;Mailing List
-
http://security.gentoo.org/glsa/glsa-201406-32.xml
IcedTea JDK: Multiple vulnerabilities (GLSA 201406-32) — Gentoo securityThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2012-0006.html
SupportThird Party Advisory
Jump to