Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-2566
HistoryMar 15, 2013 - 12:00 a.m.

CVE-2013-2566

2013-03-1500:00:00
ubuntu.com
ubuntu.com
53

0.005 Low

EPSS

Percentile

77.1%

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many
single-byte biases, which makes it easier for remote attackers to conduct
plaintext-recovery attacks via statistical analysis of ciphertext in a
large number of sessions that use the same plaintext.

Notes

Author Note
jdstrand this is a protocol problem not specific to openssl. Using openssl as a placeholder until more information is available marking low for now until more information is available. At present, naive attacks need tens to hundreds of millions of TLS connections. Optimized attacks are not present yet. marking deferred since there is no consensus on what to do (we can’t just disable RC4)
mdeslaur marking as ignored since there is no actionable item
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchfirefox< 25.0.1+build1-0ubuntu0.12.04.1UNKNOWN
ubuntu12.10noarchfirefox< 25.0.1+build1-0ubuntu0.12.10.1UNKNOWN
ubuntu13.04noarchfirefox< 25.0.1+build1-0ubuntu0.13.04.1UNKNOWN
ubuntu13.10noarchfirefox< 25.0.1+build1-0ubuntu0.13.10.1UNKNOWN
ubuntu12.04noarchthunderbird< 1:24.1.1+build1-0ubuntu0.12.04.1UNKNOWN
ubuntu12.10noarchthunderbird< 1:24.1.1+build1-0ubuntu0.12.10.1UNKNOWN
ubuntu13.04noarchthunderbird< 1:24.1.1+build1-0ubuntu0.13.04.1UNKNOWN
ubuntu13.10noarchthunderbird< 1:24.1.1+build1-0ubuntu0.13.10.1UNKNOWN