The host is installed with the DES and Triple DES ciphers and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to properly handle the DES and Triple DES ciphers, as used in the TLS, SSH, IPSec protocols, other protocols and products. Successful exploitation allows remote attackers to obtain cleartext data via a birthday attack against a long-du ...