{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2011-1096", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The W3C XML Encryption Standard, as used in the JBoss Web Services (JBossWS) component in JBoss Enterprise Portal Platform before 5.2.2 and other products, when using block ciphers in cipher-block chaining (CBC) mode, allows remote attackers to obtain plaintext data via a chosen-ciphertext attack on SOAP responses, aka \"character encoding pattern attack.\"" } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.de", "refsource" : "MISC", "url" : "http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.de" }, { "name" : "http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.html", "refsource" : "MISC", "url" : "http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.html" }, { "name" : "http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL", "refsource" : "MISC", "url" : "http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL" }, { "name" : "http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts", "refsource" : "MISC", "url" : "http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=681916", "refsource" : "MISC", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=681916" }, { "name" : "http://cxf.apache.org/note-on-cve-2011-1096.html", "refsource" : "CONFIRM", "url" : "http://cxf.apache.org/note-on-cve-2011-1096.html" }, { "name" : "RHSA-2012:1301", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-1301.html" }, { "name" : "RHSA-2012:1344", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-1344.html" }, { "name" : "RHSA-2012:1330", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-1330.html" }, { "name" : "RHSA-2013:0191", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0191.html" }, { "name" : "RHSA-2013:0192", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0192.html" }, { "name" : "RHSA-2013:0193", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0193.html" }, { "name" : "RHSA-2013:0194", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0194.html" }, { "name" : "RHSA-2013:0195", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0195.html" }, { "name" : "RHSA-2013:0196", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0196.html" }, { "name" : "RHSA-2013:0197", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0197.html" }, { "name" : "RHSA-2013:0198", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0198.html" }, { "name" : "RHSA-2013:0221", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0221.html" }, { "name" : "RHSA-2013:0261", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0261.html" }, { "name" : "RHSA-2013:1437", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-1437.html" }, { "name" : "55770", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/55770" }, { "name" : "51984", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/51984" }, { "name" : "52054", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/52054" }, { "name" : "jboss-web-services-cbc-info-disc(79031)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79031" } ] } }