MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure (2643584)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.


Synopsis :

It may be possibe to obtain sensitive information from the remote
Windows host using the Secure Channel security package.

Description :

The remote host is affected by an information disclosure
vulnerability, known as BEAST, in the SSL 3.0 and TLS 1.0 protocols
due to a flaw in the way the initialization vector (IV) is selected
when operating in cipher-block chaining (CBC) modes. A
man-in-the-middle attacker can exploit this to obtain plaintext HTTP
header data, by using a blockwise chosen-boundary attack (BCBA) on an
HTTPS session, in conjunction with JavaScript code that uses the HTML5
WebSocket API, the Java URLConnection API, or the Silverlight
WebClient API.

TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are
not affected.

See also :

https://technet.microsoft.com/library/security/ms12-006
https://www.imperialviolet.org/2011/09/23/chromeandbeast.html
https://www.openssl.org/~bodo/tls-cbc.txt

Solution :

Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7,
and 2008 R2.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 57474 ()

Bugtraq ID: 49778

CVE ID: CVE-2011-3389