CVE Vulnerabilities

CVE-2011-3389

Inadequate Encryption Strength

Published: Sep 06, 2011 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a BEAST attack.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
ChromeGoogle- (including)- (including)
Internet_explorerMicrosoft- (including)- (including)
FirefoxMozilla- (including)- (including)
Opera_browserOpera- (including)- (including)
WindowsMicrosoft- (including)- (including)
Extras for RHEL 4RedHatjava-1.6.0-sun-1:1.6.0.29-1jpp.1.el4*
Extras for RHEL 4RedHatjava-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4*
Extras for RHEL 4RedHatjava-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4*
Red Hat Enterprise Linux 5RedHatjava-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7*
Red Hat Enterprise Linux 6RedHatjava-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1*
Red Hat Enterprise Linux 6 SupplementaryRedHatjava-1.6.0-sun-1:1.6.0.29-1jpp.1.el6*
Red Hat Enterprise Linux 6 SupplementaryRedHatjava-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6*
Red Hat Network Satellite Server v 5.4RedHatjava-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4*
RHEL 4 for SAPRedHatjava-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4*
RHEL 5 for SAPRedHatjava-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5*
Supplementary for Red Hat Enterprise Linux 5RedHatjava-1.6.0-sun-1:1.6.0.29-1jpp.1.el5*
Supplementary for Red Hat Enterprise Linux 5RedHatjava-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5*
Supplementary for Red Hat Enterprise Linux 5RedHatjava-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5*
Supplementary for Red Hat Enterprise Linux 5RedHatjava-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5*
Supplementary for Red Hat Enterprise Linux 6RedHatjava-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2*
LighttpdUbuntudevel*
LighttpdUbuntuhardy*
LighttpdUbuntulucid*
LighttpdUbuntumaverick*
LighttpdUbuntunatty*
LighttpdUbuntuoneiric*
LighttpdUbuntuprecise*
LighttpdUbuntuquantal*
LighttpdUbuntuupstream*
Openjdk-6Ubuntuhardy*
Openjdk-6Ubuntulucid*
Openjdk-6Ubuntumaverick*
Openjdk-6Ubuntunatty*
Openjdk-6Ubuntuoneiric*
Openjdk-6b18Ubuntulucid*
Openjdk-6b18Ubuntumaverick*
Openjdk-6b18Ubuntunatty*
Openjdk-6b18Ubuntuoneiric*
Openjdk-7Ubuntudevel*
Openjdk-7Ubuntuoneiric*
Openjdk-7Ubuntuprecise*
Openjdk-7Ubuntuquantal*
Sun-java5Ubuntuhardy*
Sun-java6Ubuntuhardy*

Potential Mitigations

References