Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2808

Опубликовано: 01 апр. 2015
Источник: debian
EPSS Средний

Описание

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjdk-6fixed6b36-1.13.8-1experimentalpackage
openjdk-6removedpackage
openjdk-7fixed7u79-2.5.6-1package
openjdk-8fixed8u66-b01-1package

Примечания

  • This CVE is specific to the design of the RC4 protocol and not to its

  • implementations.

  • http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA

  • "Applies to client and server deployment of JSSE."

EPSS

Процентиль: 98%
0.4884
Средний

Связанные уязвимости

ubuntu
больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

redhat
больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

nvd
больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

github
около 3 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

suse-cvrf
около 10 лет назад

Security update for java-1_7_0-ibm

EPSS

Процентиль: 98%
0.4884
Средний