cvelist/2011/1xxx/CVE-2011-1096.json
2019-03-18 05:10:02 +00:00

177 lines
6.4 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1096",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The W3C XML Encryption Standard, as used in the JBoss Web Services (JBossWS) component in JBoss Enterprise Portal Platform before 5.2.2 and other products, when using block ciphers in cipher-block chaining (CBC) mode, allows remote attackers to obtain plaintext data via a chosen-ciphertext attack on SOAP responses, aka \"character encoding pattern attack.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.de",
"refsource": "MISC",
"url": "http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.de"
},
{
"name": "http://cxf.apache.org/note-on-cve-2011-1096.html",
"refsource": "CONFIRM",
"url": "http://cxf.apache.org/note-on-cve-2011-1096.html"
},
{
"name": "RHSA-2012:1301",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1301.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681916",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681916"
},
{
"name": "RHSA-2013:0192",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0192.html"
},
{
"name": "RHSA-2013:0198",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0198.html"
},
{
"name": "http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.html",
"refsource": "MISC",
"url": "http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.html"
},
{
"name": "RHSA-2013:0195",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0195.html"
},
{
"name": "RHSA-2013:0221",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0221.html"
},
{
"name": "RHSA-2013:0196",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0196.html"
},
{
"name": "RHSA-2013:1437",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html"
},
{
"name": "RHSA-2013:0193",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0193.html"
},
{
"name": "55770",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55770"
},
{
"name": "51984",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51984"
},
{
"name": "52054",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52054"
},
{
"name": "jboss-web-services-cbc-info-disc(79031)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79031"
},
{
"name": "RHSA-2012:1344",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1344.html"
},
{
"name": "RHSA-2013:0261",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0261.html"
},
{
"name": "RHSA-2013:0191",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html"
},
{
"name": "RHSA-2012:1330",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1330.html"
},
{
"name": "RHSA-2013:0197",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0197.html"
},
{
"name": "RHSA-2013:0194",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0194.html"
},
{
"name": "http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL",
"refsource": "MISC",
"url": "http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL"
},
{
"name": "http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts",
"refsource": "MISC",
"url": "http://www.csoonline.com/article/692366/widely-used-encryption-standard-is-insecure-say-experts"
}
]
}
}