CVE-2013-2566

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

Published date
2013-03-15T21:55Z
Last modification date
2020-11-23T19:48Z
Assigner
cve@mitre.org
Problem type
CWE-326

Impact

CVSS v3 vector string
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
NameURLSourceTags
http://www.isg.rhul.ac.uk/tls/http://www.isg.rhul.ac.uk/tls/MISCThird Party Advisory
http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.htmlhttp://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.htmlMISCThird Party Advisory
http://cr.yp.to/talks/2013.03.12/slides.pdfhttp://cr.yp.to/talks/2013.03.12/slides.pdfMISCThird Party Advisory
http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4CONFIRMThird Party Advisory
http://www.opera.com/security/advisory/1046http://www.opera.com/security/advisory/1046CONFIRMThird Party Advisory
http://www.opera.com/docs/changelogs/unified/1215/http://www.opera.com/docs/changelogs/unified/1215/CONFIRMThird Party Advisory
http://www.mozilla.org/security/announce/2013/mfsa2013-103.htmlhttp://www.mozilla.org/security/announce/2013/mfsa2013-103.htmlCONFIRMThird Party Advisory
USN-2031-1http://www.ubuntu.com/usn/USN-2031-1UBUNTUThird Party Advisory
USN-2032-1http://www.ubuntu.com/usn/USN-2032-1UBUNTUThird Party Advisory
GLSA-201406-19http://security.gentoo.org/glsa/glsa-201406-19.xmlGENTOOThird Party Advisory
SSRT102035http://marc.info/?l=bugtraq&m=143039468003789&w=2HPIssue Tracking, Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlCONFIRMThird Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlCONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935CONFIRMThird Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlCONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888CONFIRMThird Party Advisory
58796http://www.securityfocus.com/bid/58796BIDThird Party Advisory, VDB Entry
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705CONFIRMThird Party Advisory
GLSA-201504-01https://security.gentoo.org/glsa/201504-01GENTOOThird Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlCONFIRMThird Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlCONFIRMThird Party Advisory