![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2013-2566 |
Description: | The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-2566 BugTraq ID: 58796 http://www.securityfocus.com/bid/58796 http://security.gentoo.org/glsa/glsa-201406-19.xml https://security.gentoo.org/glsa/201504-01 HPdes Security Advisory: HPSBGN03324 http://marc.info/?l=bugtraq&m=143039468003789&w=2 HPdes Security Advisory: SSRT102035 http://marc.info/?l=bugtraq&m=143039468003789&w=2 http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html http://cr.yp.to/talks/2013.03.12/slides.pdf http://www.isg.rhul.ac.uk/tls/ http://www.ubuntu.com/usn/USN-2031-1 http://www.ubuntu.com/usn/USN-2032-1 |