5.9

CVE-2013-2566

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OracleHTTP Server Version11.1.1.7.0
OracleHTTP Server Version11.1.1.9.0
OracleHTTP Server Version12.1.3.0.0
OracleHTTP Server Version12.2.1.1.0
OracleHTTP Server Version12.2.1.2.0
OracleIntegrated Lights Out Manager Firmware Version >= 3.0.0 <= 3.2.11
OracleIntegrated Lights Out Manager Firmware Version >= 4.0.0 <= 4.0.4
FujitsuSparc Enterprise M3000 Firmware Version >= xcp < xcp_1121
   FujitsuSparc Enterprise M3000 Version-
FujitsuSparc Enterprise M4000 Firmware Version >= xcp < xcp_1121
   FujitsuSparc Enterprise M4000 Version-
FujitsuSparc Enterprise M5000 Firmware Version >= xcp < xcp_1121
   FujitsuSparc Enterprise M5000 Version-
FujitsuSparc Enterprise M8000 Firmware Version >= xcp < xcp_1121
   FujitsuSparc Enterprise M8000 Version-
FujitsuSparc Enterprise M9000 Firmware Version >= xcp < xcp_1121
   FujitsuSparc Enterprise M9000 Version-
FujitsuM10-1 Firmware Version >= xcp < xcp2280
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version >= xcp < xcp2280
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version >= xcp < xcp2280
   FujitsuM10-4s Version-
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version12.10
CanonicalUbuntu Linux Version13.04
CanonicalUbuntu Linux Version13.10
MozillaFirefox Version < 17.0.11
MozillaFirefox Version < 25.0.1
MozillaFirefox Version >= 24.1.0 < 24.1.1
MozillaSeamonkey Version < 2.22.1
MozillaThunderbird Version < 24.1.1
MozillaThunderbird Esr Version < 17.0.11
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 90.32% 0.996
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-326 Inadequate Encryption Strength

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

http://marc.info/?l=bugtraq&m=143039468003789&w=2
Third Party Advisory
Issue Tracking
http://www.isg.rhul.ac.uk/tls/
Third Party Advisory
http://www.securityfocus.com/bid/58796
Third Party Advisory
VDB Entry