Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-4930

Overview

Vulnerability Score 2.6 2.6
CVE Id CVE-2012-4930
Last Modified 29 Jan 2013 11:55:34
Published 15 Sep 2012 02:55:03
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2012-4930

Summary

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Vulnerable Systems

Application

  • Google Chrome

  • Mozilla Firefox


References

MISC - https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls

MISC - http://www.theregister.co.uk/2012/09/14/crime_tls_attack/

MISC - http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091

MISC - http://www.ekoparty.org/2012/thai-duong.php

MISC - http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312

MISC - http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html

MISC - http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/

MISC - https://bugzilla.redhat.com/show_bug.cgi?id=857737

SUSE - SUSE-SU-2012:1351


Last Updated: 27 May 2016 11:00:43