CVE-2013-2566
Publication date 15 March 2013
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | ||
openssl | ||
thunderbird | ||
Notes
jdstrand
this is a protocol problem not specific to openssl. Using openssl as a placeholder until more information is available marking low for now until more information is available. At present, naive attacks need tens to hundreds of millions of TLS connections. Optimized attacks are not present yet. marking deferred since there is no consensus on what to do (we can't just disable RC4)
mdeslaur
marking as ignored since there is no actionable item
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-2031-1
- Firefox vulnerabilities
- 20 November 2013
- USN-2032-1
- Thunderbird vulnerabilities
- 21 November 2013