Vulnerabilidad en el algoritmo RC4 (CVE-2015-2808)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-327
Uso de algoritmo criptográfico vulnerable o inseguro
Fecha de publicación:
01/04/2015
Última modificación:
12/04/2025
Descripción
El algoritmo RC4, utilizado en el protocolo TLS y el protocolo SSL, no combina correctamente los datos de estados con los datos de claves durante la fase de inicialización, lo que facilita a atacantes remotos realizar ataques de recuperación de texto claro contra los bytes iniciales de un flujo mediante la captura de trafico de la red que ocasionalmente depende de claves afectadas por la debilidad de la invariabilidad (Invariance Weakness), y posteriormente utilizar un acercamiento de fuerza bruta que involucra valores LSB, también conocido como el problema de 'Bar Mitzvah'.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:* | 3.0.0 (incluyendo) | 3.9.0 (incluyendo) |
cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:* | 9.9.2 (excluyendo) | |
cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* | 3.0.0 (incluyendo) | 3.2.11 (incluyendo) |
cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* | 4.0.0 (incluyendo) | 4.0.4 (incluyendo) |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://marc.info/?l=bugtraq&m=143456209711959&w=2
- http://marc.info/?l=bugtraq&m=143629696317098&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144059660127919&w=2
- http://marc.info/?l=bugtraq&m=144059703728085&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144104565600964&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-304.ibm.com/support/docview.wss?uid=swg21903565
- http://www-304.ibm.com/support/docview.wss?uid=swg21960015
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- http://www.huawei.com/en/psirt/security-advisories/hw-454055
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.securityfocus.com/bid/73684
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032599
- http://www.securitytracker.com/id/1032600
- http://www.securitytracker.com/id/1032707
- http://www.securitytracker.com/id/1032708
- http://www.securitytracker.com/id/1032734
- http://www.securitytracker.com/id/1032788
- http://www.securitytracker.com/id/1032858
- http://www.securitytracker.com/id/1032868
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032990
- http://www.securitytracker.com/id/1033071
- http://www.securitytracker.com/id/1033072
- http://www.securitytracker.com/id/1033386
- http://www.securitytracker.com/id/1033415
- http://www.securitytracker.com/id/1033431
- http://www.securitytracker.com/id/1033432
- http://www.securitytracker.com/id/1033737
- http://www.securitytracker.com/id/1033769
- http://www.securitytracker.com/id/1036222
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- https://security.gentoo.org/glsa/201512-10
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
- https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
- https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://marc.info/?l=bugtraq&m=143456209711959&w=2
- http://marc.info/?l=bugtraq&m=143629696317098&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144059660127919&w=2
- http://marc.info/?l=bugtraq&m=144059703728085&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144104565600964&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-304.ibm.com/support/docview.wss?uid=swg21903565
- http://www-304.ibm.com/support/docview.wss?uid=swg21960015
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3339
- http://www.huawei.com/en/psirt/security-advisories/hw-454055
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.securityfocus.com/bid/73684
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032599
- http://www.securitytracker.com/id/1032600
- http://www.securitytracker.com/id/1032707
- http://www.securitytracker.com/id/1032708
- http://www.securitytracker.com/id/1032734
- http://www.securitytracker.com/id/1032788
- http://www.securitytracker.com/id/1032858
- http://www.securitytracker.com/id/1032868
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032990
- http://www.securitytracker.com/id/1033071
- http://www.securitytracker.com/id/1033072
- http://www.securitytracker.com/id/1033386
- http://www.securitytracker.com/id/1033415
- http://www.securitytracker.com/id/1033431
- http://www.securitytracker.com/id/1033432
- http://www.securitytracker.com/id/1033737
- http://www.securitytracker.com/id/1033769
- http://www.securitytracker.com/id/1036222
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- https://security.gentoo.org/glsa/201512-10
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
- https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
- https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/