{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2015-2808","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-06T05:24:38.828Z","dateReserved":"2015-03-31T00:00:00.000Z","datePublished":"2015-04-01T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-09-07T16:46:59.848Z"},"descriptions":[{"lang":"en","value":"The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"SSRT102127","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143818140118771&w=2"},{"name":"RHSA-2015:1243","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1243.html"},{"name":"RHSA-2015:1007","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1007.html"},{"name":"HPSBGN03367","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143817899717054&w=2"},{"name":"HPSBUX03512","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"name":"RHSA-2015:1006","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1006.html"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256"},{"url":"https://kb.juniper.net/JSA10783"},{"name":"1033737","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033737"},{"name":"SUSE-SU-2015:2192","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"name":"HPSBGN03399","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144060576831314&w=2"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"name":"1036222","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1036222"},{"url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034"},{"name":"SSRT102129","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143817899717054&w=2"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960769"},{"name":"GLSA-201512-10","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/201512-10"},{"name":"RHSA-2015:1229","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1229.html"},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650"},{"name":"1032600","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032600"},{"name":"1032910","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032910"},{"name":"USN-2706-1","tags":["vendor-advisory"],"url":"http://www.ubuntu.com/usn/USN-2706-1"},{"name":"RHSA-2015:1526","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1526.html"},{"name":"SSRT102133","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143817021313142&w=2"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"name":"1032599","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032599"},{"name":"HPSBMU03401","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144104533800819&w=2"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21903565"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190"},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10163"},{"name":"HPSBMU03345","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144043644216842&w=2"},{"name":"1032734","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032734"},{"name":"IV71892","tags":["vendor-advisory"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347"},{"name":"1033769","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033769"},{"name":"1032707","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032707"},{"name":"openSUSE-SU-2015:1289","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"},{"name":"HPSBGN03372","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143817021313142&w=2"},{"name":"RHSA-2015:1091","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1091.html"},{"name":"HPSBGN03402","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144069189622016&w=2"},{"name":"IV71888","tags":["vendor-advisory"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888"},{"name":"RHSA-2015:1228","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1228.html"},{"name":"HPSBGN03405","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144060606031437&w=2"},{"name":"1032708","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032708"},{"url":"http://www.huawei.com/en/psirt/security-advisories/hw-454055"},{"name":"DSA-3316","tags":["vendor-advisory"],"url":"http://www.debian.org/security/2015/dsa-3316"},{"name":"SUSE-SU-2015:2166","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"name":"1033415","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033415"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"},{"name":"HPSBGN03366","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143818140118771&w=2"},{"url":"https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709"},{"name":"HPSBGN03403","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144104565600964&w=2"},{"name":"SSRT102254","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21883640"},{"name":"HPSBGN03407","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144102017024820&w=2"},{"name":"1033432","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033432"},{"name":"HPSBGN03354","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143629696317098&w=2"},{"name":"SUSE-SU-2015:1138","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"},{"name":"1032858","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032858"},{"name":"SSRT102073","tags":["vendor-advisory"],"url":"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922"},{"name":"1032788","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032788"},{"name":"USN-2696-1","tags":["vendor-advisory"],"url":"http://www.ubuntu.com/usn/USN-2696-1"},{"url":"https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf"},{"name":"DSA-3339","tags":["vendor-advisory"],"url":"http://www.debian.org/security/2015/dsa-3339"},{"name":"RHSA-2015:1020","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1020.html"},{"name":"RHSA-2015:1242","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1242.html"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241"},{"name":"SUSE-SU-2015:1086","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"},{"name":"1033431","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033431"},{"url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988"},{"name":"1032868","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032868"},{"name":"HPSBGN03415","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144059703728085&w=2"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"name":"91787","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/91787"},{"name":"SUSE-SU-2015:1319","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"},{"name":"SUSE-SU-2015:1320","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"},{"name":"openSUSE-SU-2015:1288","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"},{"name":"RHSA-2015:1241","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1241.html"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"name":"RHSA-2015:1230","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1230.html"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888"},{"name":"HPSBGN03338","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143456209711959&w=2"},{"name":"1033386","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033386"},{"name":"HPSBMU03377","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143741441012338&w=2"},{"name":"1033072","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033072"},{"name":"SSRT102150","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=143741441012338&w=2"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789"},{"name":"SUSE-SU-2015:1085","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119"},{"name":"RHSA-2015:1021","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1021.html"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960015"},{"name":"SUSE-SU-2015:1073","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935"},{"name":"SUSE-SU-2015:1161","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"},{"name":"HPSBGN03414","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=144059660127919&w=2"},{"name":"73684","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/73684"},{"name":"1032990","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1032990"},{"name":"1033071","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1033071"},{"name":"SUSE-SU-2016:0113","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"url":"https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2015-03-26T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T05:24:38.828Z"},"title":"CVE Program Container","references":[{"name":"SSRT102127","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143818140118771&w=2"},{"name":"RHSA-2015:1243","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1243.html"},{"name":"RHSA-2015:1007","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1007.html"},{"name":"HPSBGN03367","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143817899717054&w=2"},{"name":"HPSBUX03512","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","tags":["x_transferred"]},{"name":"RHSA-2015:1006","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1006.html"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256","tags":["x_transferred"]},{"url":"https://kb.juniper.net/JSA10783","tags":["x_transferred"]},{"name":"1033737","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033737"},{"name":"SUSE-SU-2015:2192","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"name":"HPSBGN03399","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144060576831314&w=2"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","tags":["x_transferred"]},{"name":"1036222","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1036222"},{"url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034","tags":["x_transferred"]},{"name":"SSRT102129","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143817899717054&w=2"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960769","tags":["x_transferred"]},{"name":"GLSA-201512-10","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/201512-10"},{"name":"RHSA-2015:1229","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1229.html"},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650","tags":["x_transferred"]},{"name":"1032600","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032600"},{"name":"1032910","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032910"},{"name":"USN-2706-1","tags":["vendor-advisory","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2706-1"},{"name":"RHSA-2015:1526","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1526.html"},{"name":"SSRT102133","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143817021313142&w=2"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","tags":["x_transferred"]},{"name":"1032599","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032599"},{"name":"HPSBMU03401","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144104533800819&w=2"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21903565","tags":["x_transferred"]},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190","tags":["x_transferred"]},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380","tags":["x_transferred"]},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10163","tags":["x_transferred"]},{"name":"HPSBMU03345","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144043644216842&w=2"},{"name":"1032734","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032734"},{"name":"IV71892","tags":["vendor-advisory","x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347","tags":["x_transferred"]},{"name":"1033769","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033769"},{"name":"1032707","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032707"},{"name":"openSUSE-SU-2015:1289","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"},{"name":"HPSBGN03372","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143817021313142&w=2"},{"name":"RHSA-2015:1091","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1091.html"},{"name":"HPSBGN03402","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144069189622016&w=2"},{"name":"IV71888","tags":["vendor-advisory","x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888"},{"name":"RHSA-2015:1228","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1228.html"},{"name":"HPSBGN03405","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144060606031437&w=2"},{"name":"1032708","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032708"},{"url":"http://www.huawei.com/en/psirt/security-advisories/hw-454055","tags":["x_transferred"]},{"name":"DSA-3316","tags":["vendor-advisory","x_transferred"],"url":"http://www.debian.org/security/2015/dsa-3316"},{"name":"SUSE-SU-2015:2166","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","tags":["x_transferred"]},{"name":"1033415","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033415"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246","tags":["x_transferred"]},{"name":"HPSBGN03366","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143818140118771&w=2"},{"url":"https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709","tags":["x_transferred"]},{"name":"HPSBGN03403","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144104565600964&w=2"},{"name":"SSRT102254","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21883640","tags":["x_transferred"]},{"name":"HPSBGN03407","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144102017024820&w=2"},{"name":"1033432","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033432"},{"name":"HPSBGN03354","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143629696317098&w=2"},{"name":"SUSE-SU-2015:1138","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html"},{"name":"1032858","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032858"},{"name":"SSRT102073","tags":["vendor-advisory","x_transferred"],"url":"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922"},{"name":"1032788","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032788"},{"name":"USN-2696-1","tags":["vendor-advisory","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2696-1"},{"url":"https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf","tags":["x_transferred"]},{"name":"DSA-3339","tags":["vendor-advisory","x_transferred"],"url":"http://www.debian.org/security/2015/dsa-3339"},{"name":"RHSA-2015:1020","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1020.html"},{"name":"RHSA-2015:1242","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1242.html"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727","tags":["x_transferred"]},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241","tags":["x_transferred"]},{"name":"SUSE-SU-2015:1086","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html"},{"name":"1033431","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033431"},{"url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm","tags":["x_transferred"]},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988","tags":["x_transferred"]},{"name":"1032868","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032868"},{"name":"HPSBGN03415","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144059703728085&w=2"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","tags":["x_transferred"]},{"name":"91787","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/91787"},{"name":"SUSE-SU-2015:1319","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"},{"name":"SUSE-SU-2015:1320","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"},{"name":"openSUSE-SU-2015:1288","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"},{"name":"RHSA-2015:1241","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1241.html"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140","tags":["x_transferred"]},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","tags":["x_transferred"]},{"name":"RHSA-2015:1230","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1230.html"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888","tags":["x_transferred"]},{"name":"HPSBGN03338","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143456209711959&w=2"},{"name":"1033386","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033386"},{"name":"HPSBMU03377","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143741441012338&w=2"},{"name":"1033072","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033072"},{"name":"SSRT102150","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=143741441012338&w=2"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789","tags":["x_transferred"]},{"name":"SUSE-SU-2015:1085","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119","tags":["x_transferred"]},{"name":"RHSA-2015:1021","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-1021.html"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960015","tags":["x_transferred"]},{"name":"SUSE-SU-2015:1073","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935","tags":["x_transferred"]},{"name":"SUSE-SU-2015:1161","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html"},{"name":"HPSBGN03414","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144059660127919&w=2"},{"name":"73684","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/73684"},{"name":"1032990","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1032990"},{"name":"1033071","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1033071"},{"name":"SUSE-SU-2016:0113","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"url":"https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/","tags":["x_transferred"]}]}]}}