CVE-2015-2808

Severity

43%

Complexity

86%

Confidentiality

48%

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).

Overview

First reported 9 years ago

2015-04-01 02:00:00

Last updated 7 years ago

2018-01-18 18:18:00

Affected Software

Apple Safari

Microsoft Internet Explorer

Mozilla Firefox

IBM WebSphere Application Server

Oracle GlassFish

References

http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727

SUSE-SU-2015:1073

SUSE-SU-2015:1085

SUSE-SU-2015:1086

SUSE-SU-2015:1138

SUSE-SU-2015:1161

openSUSE-SU-2015:1288

openSUSE-SU-2015:1289

SUSE-SU-2015:1319

SUSE-SU-2015:1320

SUSE-SU-2015:2166

SUSE-SU-2015:2192

SUSE-SU-2016:0113

HPSBGN03338

HPSBGN03354

HPSBMU03377

SSRT102133

HPSBGN03367

SSRT102127

HPSBMU03345

HPSBGN03414

HPSBGN03415

HPSBGN03399

HPSBGN03405

HPSBGN03402

HPSBGN03407

HPSBMU03401

HPSBGN03403

HPSBUX03512

RHSA-2015:1006

RHSA-2015:1007

RHSA-2015:1020

RHSA-2015:1021

RHSA-2015:1091

RHSA-2015:1228

RHSA-2015:1229

RHSA-2015:1230

RHSA-2015:1241

RHSA-2015:1242

RHSA-2015:1243

RHSA-2015:1526

DSA-3316

DSA-3339

http://www.huawei.com/en/psirt/security-advisories/hw-454055

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

73684

91787

1032599

1032600

1032707

1032708

1032734

1032788

1032858

1032868

1032910

1032990

1033071

1033072

1033386

1033415

1033431

1033432

1033737

1033769

1036222

USN-2696-1

USN-2706-1

IV71888

IV71892

http://www-01.ibm.com/support/docview.wss?uid=swg21883640

http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm

http://www-304.ibm.com/support/docview.wss?uid=swg21903565

http://www-304.ibm.com/support/docview.wss?uid=swg21960015

http://www-304.ibm.com/support/docview.wss?uid=swg21960769

SSRT102073

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789

https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650

https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888

https://kb.juniper.net/JSA10783

https://kc.mcafee.com/corporate/index?page=content&id=SB10163

GLSA-201512-10

https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf

Vendor Advisory

https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.