CVE-2013-2566
Severity CVSS v4.0:
Pending analysis
Type:
CWE-326
Inadequate Encryption Strength
Publication date:
15/03/2013
Last modified:
11/04/2025
Description
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.9.1 (including) |
cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.2.11 (including) |
cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.0.4 (including) |
cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:* | xcp (including) | xcp_1121 (excluding) |
cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:* | xcp (including) | xcp_1121 (excluding) |
cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:* | xcp (including) | xcp_1121 (excluding) |
cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:* | xcp (including) | xcp_1121 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html
- http://cr.yp.to/talks/2013.03.12/slides.pdf
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://marc.info/?l=bugtraq&m=143039468003789&w=2
- http://marc.info/?l=bugtraq&m=143039468003789&w=2
- http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4
- http://security.gentoo.org/glsa/glsa-201406-19.xml
- http://www.isg.rhul.ac.uk/tls/
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.opera.com/docs/changelogs/unified/1215/
- http://www.opera.com/security/advisory/1046
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/58796
- http://www.ubuntu.com/usn/USN-2031-1
- http://www.ubuntu.com/usn/USN-2032-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://security.gentoo.org/glsa/201504-01
- http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html
- http://cr.yp.to/talks/2013.03.12/slides.pdf
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://marc.info/?l=bugtraq&m=143039468003789&w=2
- http://marc.info/?l=bugtraq&m=143039468003789&w=2
- http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4
- http://security.gentoo.org/glsa/glsa-201406-19.xml
- http://www.isg.rhul.ac.uk/tls/
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.opera.com/docs/changelogs/unified/1215/
- http://www.opera.com/security/advisory/1046
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/58796
- http://www.ubuntu.com/usn/USN-2031-1
- http://www.ubuntu.com/usn/USN-2032-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://security.gentoo.org/glsa/201504-01