CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
References
Link Resource
http://www.ekoparty.org/2012/thai-duong.php
http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
http://code.google.com/p/chromium/issues/detail?id=139744
http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512
https://chromiumcodereview.appspot.com/10825183
https://gist.github.com/3696912
http://news.ycombinator.com/item?id=4510829
http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor
https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212
http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
https://bugzilla.redhat.com/show_bug.cgi?id=857051
http://www.ubuntu.com/usn/USN-1628-1
http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html
http://www.debian.org/security/2012/dsa-2579
http://www.ubuntu.com/usn/USN-1627-1
http://www.securityfocus.com/bid/55704
http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html
http://rhn.redhat.com/errata/RHSA-2013-0587.html
http://www.debian.org/security/2013/dsa-2627
http://support.apple.com/kb/HT5784
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://www.ubuntu.com/usn/USN-1898-1
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
http://www.debian.org/security/2015/dsa-3253
http://jvn.jp/en/jp/JVN65273415/index.html
http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html
http://marc.info/?l=bugtraq&m=136612293908376&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920
https://github.com/mpgn/CRIME-poc
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Information

Published : 2012-09-15 11:55

Updated : 2018-04-21 18:29


NVD link : CVE-2012-4929

Mitre link : CVE-2012-4929


JSON object : View

CWE
CWE-310

Cryptographic Issues

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

google

  • chrome

mozilla

  • firefox