First published: Fri Dec 16 2011(Updated: )
The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 does not prevent the use of weak ciphers for SSL sessions, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a crafted CipherSuite list.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.3.1_build1013110726.09 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4747 is classified as a medium severity vulnerability due to its potential to weaken SSL session security.
To fix CVE-2011-4747, update Parallels Plesk Panel to a version that disables weak ciphers in SSL sessions.
CVE-2011-4747 specifically affects Parallels Plesk Panel version 10.3.1_build1013110726.09.
Exploitation of CVE-2011-4747 could allow attackers to intercept or decrypt sensitive information transmitted over SSL connections.
A temporary workaround for CVE-2011-4747 is to configure the server to restrict the use of weak ciphers until a patch is applied.