CVE-2013-2566

Publication date 15 March 2013

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

Read the notes from the security team

Status

Package Ubuntu Release Status
firefox 13.10 saucy
Fixed 25.0.1+build1-0ubuntu0.13.10.1
13.04 raring
Fixed 25.0.1+build1-0ubuntu0.13.04.1
12.10 quantal
Fixed 25.0.1+build1-0ubuntu0.12.10.1
12.04 LTS precise
Fixed 25.0.1+build1-0ubuntu0.12.04.1
10.04 LTS lucid Ignored end of life
openssl 13.10 saucy Ignored
13.04 raring Ignored
12.10 quantal Ignored
12.04 LTS precise Ignored
11.10 oneiric Ignored
10.04 LTS lucid Ignored
8.04 LTS hardy Ignored
thunderbird 13.10 saucy
Fixed 1:24.1.1+build1-0ubuntu0.13.10.1
13.04 raring
Fixed 1:24.1.1+build1-0ubuntu0.13.04.1
12.10 quantal
Fixed 1:24.1.1+build1-0ubuntu0.12.10.1
12.04 LTS precise
Fixed 1:24.1.1+build1-0ubuntu0.12.04.1
10.04 LTS lucid Ignored end of life

Notes


jdstrand

this is a protocol problem not specific to openssl. Using openssl as a placeholder until more information is available marking low for now until more information is available. At present, naive attacks need tens to hundreds of millions of TLS connections. Optimized attacks are not present yet. marking deferred since there is no consensus on what to do (we can't just disable RC4)


mdeslaur

marking as ignored since there is no actionable item

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N