Vulnerability Description
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Communications Application Session Controller | >= 3.0.0, <= 3.9.1 |
| Oracle | Http Server | 11.1.1.7.0 |
| Oracle | Integrated Lights Out Manager Firmware | >= 3.0.0, <= 3.2.11 |
| Fujitsu | Sparc Enterprise M3000 Firmware | >= xcp, < xcp_1121 |
| Fujitsu | Sparc Enterprise M3000 | - |
| Fujitsu | Sparc Enterprise M4000 Firmware | >= xcp, < xcp_1121 |
| Fujitsu | Sparc Enterprise M4000 | - |
| Fujitsu | Sparc Enterprise M5000 Firmware | >= xcp, < xcp_1121 |
| Fujitsu | Sparc Enterprise M5000 | - |
| Fujitsu | Sparc Enterprise M8000 Firmware | >= xcp, < xcp_1121 |
| Fujitsu | Sparc Enterprise M8000 | - |
| Fujitsu | Sparc Enterprise M9000 Firmware | >= xcp, < xcp_1121 |
| Fujitsu | Sparc Enterprise M9000 | - |
| Fujitsu | M10-1 Firmware | >= xcp, < xcp2280 |
| Fujitsu | M10-1 | - |
| Fujitsu | M10-4 Firmware | >= xcp, < xcp2280 |
| Fujitsu | M10-4 | - |
| Fujitsu | M10-4S Firmware | >= xcp, < xcp2280 |
| Fujitsu | M10-4S | - |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-brThird Party Advisory
- http://cr.yp.to/talks/2013.03.12/slides.pdfThird Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705Third Party Advisory
- http://marc.info/?l=bugtraq&m=143039468003789&w=2Issue TrackingThird Party Advisory
- http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4Third Party Advisory
- http://security.gentoo.org/glsa/glsa-201406-19.xmlThird Party Advisory
- http://www.isg.rhul.ac.uk/tls/Third Party Advisory
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.htmlThird Party Advisory
- http://www.opera.com/docs/changelogs/unified/1215/Third Party Advisory
- http://www.opera.com/security/advisory/1046Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlThird Party Advisory
FAQ
What is CVE-2013-2566?
CVE-2013-2566 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis ...
How severe is CVE-2013-2566?
CVE-2013-2566 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2566?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Communications Application Session Controller, Oracle Http Server, Oracle Integrated Lights Out Manager Firmware, Fujitsu Sparc Enterprise M3000 Firmware, Fujitsu Sparc Enterprise M3000.