![]() OpenSSH for GPFS V3.5 for Windows Remediation/Fixes This vulnerability is commonly referred to as “Bar Mitzvah Attack”.ĬVSS Temporal Score: See < for the current scoreĬVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N) Affected Products and Versions ![]() Successful exploitation could allow an attacker to retrieve credit card data or other sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session. Vulnerability DetailsĭESCRIPTION: The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. Additionally, with the recent attention to RC4 “Bar Mitzvah” Attack for SSL/TLS, this is a reminder to NOT enable weak or export-level cipher suites for IBM General Parallel File System (GPFS). ![]() The RC4 “Bar Mitzvah” Attack for SSL/TLS affects OpenSSH for GPFS V3.5 for Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |