Bugzilla – Bug 809908
VUL-1: CVE-2013-2566: RC4: new weakness discovered
Last modified: 2019-10-24 13:33:52 UTC
via CVE DB and Dan Bernstein: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566 The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. MISC:http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html MISC:http://cr.yp.to/talks/2013.03.12/slides.pdf MISC:http://www.isg.rhul.ac.uk/tls/
bugbot adjusting priority
we are phasing out RC4, moving towards TLS 1.2 etc.
Customer question: Does this CVE affect suse11sp1? Does this CVE affect suse11sp3?
Yes.
RC4 can be disabled in most services by sup[plying !RC4 in the cipher list.
(In reply to Marcus Meissner from comment #5) > RC4 can be disabled in most services by sup[plying !RC4 in the cipher list. Hi: May I know which config file should I modify ? Customer want to get a guide to "disable RC4".
It depends on the service, all services have separate cipher configurations in their configuration files.
resolved