Although many SSL certificates have been boasting extravagant guarantees -- typically around $10k minimum to $250k per breach -- to ensure their certificates are valid, to this date, I've heard that there has never been a single payout due to the fact the certificates limit the warranty to just data transmitted en-route rather than post-transmission (which is very rare because hackers usually target storage databases to get more data in one shot).
Still, now that a vulnerability has been discovered in TLS 1.0 which allows the encryption to be broken for data stored in cookies (I got the news from this article: http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/) does that mean SSL Issuers are responsible for data stolen since the attack goes straight to the encrypted data while transmitted.
Also, is it possible for the CA's to force clients to obtain new certificates which use TLS 1.1 or another proven technology, in order to reduce the risk (or allow them to continue using 1.0 without the guarantee), or is that not feasible since I'm sure many SSL owners use shared hosting or outsource management so they have little voice in the process.