CVE-2011-3389

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-3389
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-3389.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-3389
Aliases
Downstream
Related
Published
2011-09-06T19:55:03Z
Modified
2025-08-09T19:01:29Z
Summary
[none]
Details

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

References

Affected packages