First published: Thu Mar 14 2013(Updated: )
A new attack was discovered against TLS that allows an attacker to recover a limited amount of plaintext from a TLS connection when RC4 encryption is used. The attacks arise from statistical flaws in the keystream generated by the RC4 algorithm which become apparent in TLS ciphertexts when the same plaintext is repeatedly encrypted at a fixed location across many TLS sessions. Reference: <a href="http://www.isg.rhul.ac.uk/tls/">http://www.isg.rhul.ac.uk/tls/</a> <a href="http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html">http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Communications Application Session Controller | >=3.0.0<=3.9.1 | |
Oracle HTTP Server | =11.1.1.7.0 | |
Oracle HTTP Server | =11.1.1.9.0 | |
Oracle HTTP Server | =12.1.3.0.0 | |
Oracle HTTP Server | =12.2.1.1.0 | |
Oracle HTTP Server | =12.2.1.2.0 | |
Oracle Integrated Lights Out Manager Firmware | >=3.0.0<=3.2.11 | |
Oracle Integrated Lights Out Manager Firmware | >=4.0.0<=4.0.4 | |
Fujitsu SPARC Enterprise M3000 Firmware | >=xcp<xcp_1121 | |
Oracle SPARC Enterprise m3000 Server | ||
Fujitsu SPARC Enterprise M4000 Firmware | >=xcp<xcp_1121 | |
Fujitsu SPARC Enterprise M4000 Firmware | ||
Fujitsu SPARC Enterprise M5000 Firmware | >=xcp<xcp_1121 | |
Oracle SPARC Enterprise m5000 Server | ||
Fujitsu SPARC Enterprise M8000 Firmware | >=xcp<xcp_1121 | |
Fujitsu SPARC Enterprise M8000 Firmware | ||
Fujitsu SPARC Enterprise M9000 Firmware | >=xcp<xcp_1121 | |
Fujitsu SPARC Enterprise M9000 Firmware | ||
Oracle Fujitsu M10-1 Firmware | >=xcp<xcp2280 | |
Oracle Fujitsu M10-1 | ||
Oracle Fujitsu M10-4 Firmware | >=xcp<xcp2280 | |
Oracle Fujitsu M10-4 | ||
fujitsu m10-4s firmware | >=xcp<xcp2280 | |
fujitsu m10-4s | ||
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 | |
Ubuntu Linux | =13.10 | |
Mozilla Firefox | <25.0.1 | |
Mozilla Firefox ESR | <17.0.11 | |
Mozilla Firefox ESR | >=24.1.0<24.1.1 | |
Mozilla SeaMonkey | <2.22.1 | |
Mozilla Thunderbird | <24.1.1 | |
Mozilla Thunderbird ESR | <17.0.11 | |
All of | ||
Fujitsu SPARC Enterprise M3000 Firmware | >=xcp<xcp_1121 | |
Oracle SPARC Enterprise m3000 Server | ||
All of | ||
Fujitsu SPARC Enterprise M4000 Firmware | >=xcp<xcp_1121 | |
Fujitsu SPARC Enterprise M4000 Firmware | ||
All of | ||
Fujitsu SPARC Enterprise M5000 Firmware | >=xcp<xcp_1121 | |
Oracle SPARC Enterprise m5000 Server | ||
All of | ||
Fujitsu SPARC Enterprise M8000 Firmware | >=xcp<xcp_1121 | |
Fujitsu SPARC Enterprise M8000 Firmware | ||
All of | ||
Fujitsu SPARC Enterprise M9000 Firmware | >=xcp<xcp_1121 | |
Fujitsu SPARC Enterprise M9000 Firmware | ||
All of | ||
Oracle Fujitsu M10-1 Firmware | >=xcp<xcp2280 | |
Oracle Fujitsu M10-1 | ||
All of | ||
Oracle Fujitsu M10-4 Firmware | >=xcp<xcp2280 | |
Oracle Fujitsu M10-4 | ||
All of | ||
fujitsu m10-4s firmware | >=xcp<xcp2280 | |
fujitsu m10-4s | ||
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 | |
Mozilla Firefox | <17.0.11 | |
Mozilla Firefox | >=24.1.0<24.1.1 | |
GE Web Server | ||
GE Access | ||
GE Access | ||
GE Access | ||
GE Access | ||
GE UR bootloader binary |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2566 is categorized as a medium severity vulnerability due to its potential to leak limited plaintext data from TLS connections using RC4 encryption.
To fix CVE-2013-2566, disable RC4 encryption in your TLS configuration and switch to a stronger cipher.
CVE-2013-2566 affects various software including GE firmware versions 7.4x to 8.0x and multiple versions of Oracle HTTP Server.
Yes, CVE-2013-2566 can be exploited remotely if an attacker can intercept and manipulate the TLS traffic.
CVE-2013-2566 specifically targets the RC4 encryption algorithm used in TLS connections.