Unrated severityNVD Advisory· Published Apr 1, 2015· Updated May 6, 2026
CVE-2015-2808
CVE-2015-2808
Description
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Affected products
105- cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*
cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*
- cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*
cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*Range: >=3.0.0,<=3.9.0
- cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*Range: <9.9.2
cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*Range: >=xcp,<xcp_1121
- cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*Range: >=xcp,<xcp_1121
- cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*Range: >=xcp,<xcp_1121
- cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*Range: >=xcp,<xcp_1121
- cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*Range: >=xcp,<xcp_1121
- cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*Range: >=3.0.0,<=3.2.11
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*+ 4 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
101- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvdPatchThird Party Advisory
- h20564.www2.hpe.com/hpsc/doc/public/displaynvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.htmlnvdMailing ListThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1006.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1007.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1020.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1021.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1091.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1228.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1229.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1230.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1241.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1242.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1243.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1526.htmlnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-304.ibm.com/support/docview.wssnvdThird Party Advisory
- www-304.ibm.com/support/docview.wssnvdThird Party Advisory
- www-304.ibm.com/support/docview.wssnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3316nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3339nvdThird Party Advisory
- www.huawei.com/en/psirt/security-advisories/hw-454055nvdThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/73684nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/91787nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032599nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032600nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032707nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032708nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032734nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032788nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032858nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032868nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032910nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032990nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033071nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033072nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033386nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033415nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033431nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033432nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033737nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033769nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1036222nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2696-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2706-1nvdThird Party Advisory
- www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htmnvdThird Party Advisory
- h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/hpsc/doc/public/displaynvdThird Party Advisory
- h20566.www2.hpe.com/hpsc/doc/public/displaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- kb.juniper.net/JSA10783nvdThird Party Advisory
- security.gentoo.org/glsa/201512-10nvdThird Party Advisory
- www-947.ibm.com/support/entry/portal/docdisplaynvdThird Party Advisory
- www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdfnvdTechnical DescriptionThird Party Advisory
- kc.mcafee.com/corporate/indexnvdBroken Link
- www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/nvd
News mentions
0No linked articles in our index yet.