Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2015-2808: [TRACKERBUG] RC4 (TLS/SSL) invariance weakness and recovery of plaintext LSBs from initial encrypted bytes on certain weak keys a.k.a "Bar mitzvah attack" | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Andreas Stieger <astieger> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | al.kammer, james.hostelley, jsegitz, khris.francisco, meissner, smash_bz |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/115400/ | ||
Whiteboard: | CVSSv2:SUSE:CVE-2015-2808:2.6:(AV:N/AC:H/Au:N/C:P/I:N/A:N) | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Bug Depends on: | 929736, 938895 | ||
Bug Blocks: |
Description
Andreas Stieger
2015-04-01 09:34:22 UTC
bugbot adjusting priority Research into ciphers, digest and key exchange algorithms in the TLS/SSL stack will continue to discover weaknesses and attacks. In this case, RC4 can be considered weak and it's use dis-encouraged, however there will be no disabling patches for existing SLE products to remove RC4 functionality. Remediation is available through configuration if loss of compatibility with RC4 is acceptable. For new products, e.g. Apache httpd in SLE 12 the default configurations have already been adjusted to exclude RC4. Closing as WONTFIX. Can we upgrade open SSL to version 1.1.0 to fix this vulnerability within sentinel running on SLES 11 SP4? (In reply to james hostelley from comment #3) > Can we upgrade open SSL to version 1.1.0 to fix this vulnerability within > sentinel running on SLES 11 SP4? No. Just use !RC4 in your ssl cipher strings for instance. |