5
CVSSv2

CVE-2011-1096

Published: 23/11/2012 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The W3C XML Encryption Standard, as used in the JBoss Web Services (JBossWS) component in JBoss Enterprise Portal Platform prior to 5.2.2 and other products, when using block ciphers in cipher-block chaining (CBC) mode, allows remote malicious users to obtain plaintext data via a chosen-ciphertext attack on SOAP responses, aka "character encoding pattern attack."

Vulnerable Product Search on Vulmon Subscribe to Product

redhat jboss enterprise portal platform 5.0.0

redhat jboss enterprise portal platform 5.1.1

redhat jboss enterprise portal platform 5.1.0

redhat jboss enterprise portal platform

redhat jboss enterprise portal platform 5.2.0

redhat jboss enterprise portal platform 5.0.1

Vendor Advisories

Synopsis Important: JBoss Enterprise Application Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Application Platform 520 packages that fixmultiple security issues, various bugs, and add several enhancements arenow available for Red Hat Enterprise Linux 6Th ...
Synopsis Important: JBoss Enterprise Web Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Web Platform 520 packages that fix multiplesecurity issues, various bugs, and add several enhancements are nowavailable for Red Hat Enterprise Linux 5The Red Hat Securi ...
Synopsis Important: JBoss Enterprise Web Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Web Platform 520 packages that fix multiplesecurity issues, various bugs, and add several enhancements are nowavailable for Red Hat Enterprise Linux 6The Red Hat Securi ...
Synopsis Important: JBoss Enterprise Web Platform 520 update Type/Severity Security Advisory: Important Topic JBoss Enterprise Web Platform 520, which fixes multiple security issues,various bugs, and adds several enhancements, is now available from the RedHat Customer PortalThe Red Hat Security Respons ...
Synopsis Important: JBoss Enterprise Application Platform 430 CP10 security update Type/Severity Security Advisory: Important Topic An update for the JBoss Web Services component in JBoss EnterpriseApplication Platform 430 CP10 which fixes one security issue is nowavailable from the Red Hat Customer Por ...
Synopsis Important: JBoss Enterprise Application Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Application Platform 520 packages that fixmultiple security issues, various bugs, and add several enhancements arenow available for Red Hat Enterprise Linux 5Th ...
Synopsis Important: JBoss Web Services security update Type/Severity Security Advisory: Important Topic An update for the JBoss Web Services component in JBoss Enterprise SOAPlatform 43 CP05 and JBoss Enterprise Portal Platform 43 CP07 which fixesone security issue is now available from the Red Hat Custom ...
Synopsis Important: JBoss Enterprise Application Platform 520 update Type/Severity Security Advisory: Important Topic JBoss Enterprise Application Platform 520, which fixes multiple securityissues, various bugs, and adds several enhancements, is now available fromthe Red Hat Customer PortalThe Red Hat ...

References

CWE-310http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.htmlhttp://rhn.redhat.com/errata/RHSA-2012-1301.htmlhttp://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-expertshttps://bugzilla.redhat.com/show_bug.cgi?id=681916http://cxf.apache.org/note-on-cve-2011-1096.htmlhttp://rhn.redhat.com/errata/RHSA-2012-1344.htmlhttp://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DLhttp://www.securityfocus.com/bid/55770http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.dehttp://rhn.redhat.com/errata/RHSA-2012-1330.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0194.htmlhttp://secunia.com/advisories/51984http://rhn.redhat.com/errata/RHSA-2013-0195.htmlhttp://secunia.com/advisories/52054http://rhn.redhat.com/errata/RHSA-2013-0198.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0197.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0191.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0196.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0221.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0193.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0192.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0261.htmlhttp://rhn.redhat.com/errata/RHSA-2013-1437.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/79031https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/8d5d29747548a24cccdb7f3e2d4d599ffb7ffe4537426b3c9a852cf4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3Ehttps://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2013:0191