Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2808

Опубликовано: 30 мар. 2015
Источник: redhat
CVSS2: 4.3
EPSS Средний

Описание

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

Отчет

This flaw is related to the design of the RC4 protocol and not its implementation. Therefore there are no plans to correct this issue in Red Hat Enterprise Linux 5, 6 and 7. Future updates may disable the use of RC4 in various components.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5gnutlsWill not fix
Red Hat Enterprise Linux 5nssWill not fix
Red Hat Enterprise Linux 5opensslAffected
Red Hat Enterprise Linux 6gnutlsAffected
Red Hat Enterprise Linux 6nssWill not fix
Red Hat Enterprise Linux 6opensslWill not fix
Red Hat Enterprise Linux 7gnutlsAffected
Red Hat Enterprise Linux 7nssWill not fix
Red Hat Enterprise Linux 7opensslWill not fix
Oracle Java for Red Hat Enterprise Linux 5java-1.7.0-oracleFixedRHSA-2015:124217.07.2015

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1207101SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher

EPSS

Процентиль: 98%
0.4884
Средний

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

nvd
больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

debian
больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does ...

github
около 3 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

suse-cvrf
около 10 лет назад

Security update for java-1_7_0-ibm

EPSS

Процентиль: 98%
0.4884
Средний

4.3 Medium

CVSS2