Upstream information

CVE-2013-2566 at MITRE

Description

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
SUSE Bugzilla entries: 1004304 [RESOLVED / FIXED], 809908 [REOPENED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP4
  • libfreebl3 >= 3.17.3-0.8.11
  • libfreebl3-32bit >= 3.17.3-0.8.11
  • libfreebl3-x86 >= 3.17.3-0.8.11
  • libsoftokn3 >= 3.17.3-0.8.11
  • libsoftokn3-32bit >= 3.17.3-0.8.11
  • libsoftokn3-x86 >= 3.17.3-0.8.11
  • mozilla-nss >= 3.17.3-0.8.11
  • mozilla-nss-32bit >= 3.17.3-0.8.11
  • mozilla-nss-tools >= 3.17.3-0.8.11
  • mozilla-nss-x86 >= 3.17.3-0.8.11
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA libfreebl3
SUSE Linux Enterprise Software Development Kit 11 SP4
  • mozilla-nss-devel >= 3.17.3-0.8.11
Patchnames:
SUSE Linux Enterprise Software Development Kit 11 SP4 GA mozilla-nss-devel