Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-4929

Опубликовано: 15 сент. 2012
Источник: debian
EPSS Средний

Описание

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iceweaselnot-affectedpackage
chromium-browserfixed22.0.1229.94~r161065-1package
chromium-browserend-of-lifesqueezepackage
qt4-x11fixed4:4.8.2+dfsg-3package
apache2fixed2.2.22-12package
lighttpdfixed1.4.30-1package
nginxfixed1.2.1-2.2package
qt4-x11no-dsasqueezepackage
opensslfixed1.0.1e-5package
opensslfixed1.0.1e-2+deb7u11wheezypackage
opensslfixed0.9.8o-4squeeze16squeezepackage
poundfixed2.6-3package

Примечания

  • Chromium fix: https://chromiumcodereview.appspot.com/10825183/

  • openssl redhat announcement https://rhn.redhat.com/errata/RHSA-2013-0587.html

  • openssl disables compression by default since dc5744cb78da6f2bcafeeefe22c604a51b52dfc5

EPSS

Процентиль: 94%
0.13137
Средний

Связанные уязвимости

ubuntu
почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

redhat
почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

nvd
почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

github
около 3 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

oracle-oval
больше 12 лет назад

ELSA-2013-0587: openssl security update (MODERATE)

EPSS

Процентиль: 94%
0.13137
Средний