How to Buy
This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.
It may be possibe to obtain sensitive information from the remote
Windows host using the Secure Channel security package.
The remote host is affected by an information disclosure
vulnerability, known as BEAST, in the SSL 3.0 and TLS 1.0 protocols
due to a flaw in the way the initialization vector (IV) is selected
when operating in cipher-block chaining (CBC) modes. A
man-in-the-middle attacker can exploit this to obtain plaintext HTTP
header data, by using a blockwise chosen-boundary attack (BCBA) on an
WebSocket API, the Java URLConnection API, or the Silverlight
TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are
See also :
Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7,
and 2008 R2.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : false
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 57474 ()
Bugtraq ID: 49778
CVE ID: CVE-2011-3389
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.