Back to search

VMSA-2012-0003: ESX update for Oracle JRE 1.5.0_32 (CVE-2011-3389)

Severity CVSS Published Added Modified
4 (AV:N/AC:M/Au:N/C:P/I:N/A:N) September 06, 2011 March 23, 2012 March 03, 2014


The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now



VMware VMware ESX Server 3.5

Upgrade VMware ESX 3.5 to build number 604481

Download and apply the upgrade from:

The typical way to apply patches to VMware ESX 3.5 hosts is via the vCenter Update Manager. For details, see the vCenter Update Manager Administration Guide.

To update ESX/ESXi hosts without using Update Manager, obtain the patch for this vulnerability by searching for the build number in the link below

Related Vulnerabilities