{ "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The W3C XML Encryption Standard, as used in the JBoss Web Services (JBossWS) component in JBoss Enterprise Portal Platform before 5.2.2 and other products, when using block ciphers in cipher-block chaining (CBC) mode, allows remote attackers to obtain plaintext data via a chosen-ciphertext attack on SOAP responses, aka \"character encoding pattern attack.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.de", "refsource": "MISC", "url": "http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.de" }, { "name": "http://cxf.apache.org/note-on-cve-2011-1096.html", "refsource": "CONFIRM", "url": "http://cxf.apache.org/note-on-cve-2011-1096.html" }, { "name": "RHSA-2012:1301", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1301.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=681916", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681916" }, { "name": "RHSA-2013:0192", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html" }, { "name": "RHSA-2013:0198", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html" }, { "name": "http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.html", "refsource": "MISC", "url": "http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.html" }, { "name": "RHSA-2013:0195", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html" }, { "name": "RHSA-2013:0221", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html" }, { "name": "RHSA-2013:0196", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html" }, { "name": "RHSA-2013:1437", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html" }, { "name": "RHSA-2013:0193", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html" }, { "name": "55770", "refsource": "BID", "url": "http://www.securityfocus.com/bid/55770" }, { "name": "51984", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51984" }, { "name": "52054", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/52054" }, { "name": "jboss-web-services-cbc-info-disc(79031)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79031" }, { "name": "RHSA-2012:1344", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1344.html" }, { "name": "RHSA-2013:0261", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0261.html" }, { "name": "RHSA-2013:0191", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html" }, { "name": "RHSA-2012:1330", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1330.html" }, { "name": "RHSA-2013:0197", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html" }, { "name": "RHSA-2013:0194", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html" }, { "name": "http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL", "refsource": "MISC", "url": "http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL" }, { "name": "http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts", "refsource": "MISC", "url": "http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts" } ] } }