Vulnerability Details

Feed Type Docker
Title CVE-2011-3389
Description The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Severity: Negligible
More Information: https://security-tracker.debian.org/tracker/CVE-2011-3389

Namespace: debian:10
Feature: gnutls28
Feature Version: 3.6.7-4+deb10u5
Fixed By Version:
Container Layer Hash sha256:d121f8d1c4128ebc1e95e5bfad90a0189b84eadbbb2fbaad20cbb26d20b2c8a2
Source Clair
Assessment Ignore by gdivis@inedo.local on 9/16/2020 9:51:04 AM
Expiration 12/15/2020 8:51:04 AM (90 days from assessment)

Comments

There are no comments for this vulnerability.