ALT-PU-2013-1150-1
Closed vulnerabilities
Published: 2013-03-16
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2013-2566
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
Severity: MEDIUM (5.9)
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html
- http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html
- http://cr.yp.to/talks/2013.03.12/slides.pdf
- http://cr.yp.to/talks/2013.03.12/slides.pdf
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- HPSBGN03324
- HPSBGN03324
- SSRT102035
- SSRT102035
- http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4
- http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4
- GLSA-201406-19
- GLSA-201406-19
- http://www.isg.rhul.ac.uk/tls/
- http://www.isg.rhul.ac.uk/tls/
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.opera.com/docs/changelogs/unified/1215/
- http://www.opera.com/docs/changelogs/unified/1215/
- http://www.opera.com/security/advisory/1046
- http://www.opera.com/security/advisory/1046
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 58796
- 58796
- USN-2031-1
- USN-2031-1
- USN-2032-1
- USN-2032-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- GLSA-201504-01
- GLSA-201504-01
Published: 2013-11-20
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2013-5607
Integer overflow in the PL_ArenaAllocate function in Mozilla Netscape Portable Runtime (NSPR) before 4.10.2, as used in Firefox before 25.0.1, Firefox ESR 17.x before 17.0.11 and 24.x before 24.1.1, and SeaMonkey before 2.22.1, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted X.509 certificate, a related issue to CVE-2013-1741.
Severity: HIGH (7.5)
References:
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- SUSE-SU-2013:1807
- SUSE-SU-2013:1807
- openSUSE-SU-2013:1732
- openSUSE-SU-2013:1732
- RHSA-2013:1791
- RHSA-2013:1791
- RHSA-2013:1829
- RHSA-2013:1829
- GLSA-201406-19
- GLSA-201406-19
- DSA-2820
- DSA-2820
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 63802
- 63802
- USN-2031-1
- USN-2031-1
- USN-2032-1
- USN-2032-1
- USN-2087-1
- USN-2087-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=927687
- https://bugzilla.mozilla.org/show_bug.cgi?id=927687
- [dev-tech-nspr] 20131113 [ANNOUNCE] NSPR 4.10.2 Release
- [dev-tech-nspr] 20131113 [ANNOUNCE] NSPR 4.10.2 Release
- GLSA-201504-01
- GLSA-201504-01
No data currently available.