Описание
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2016-7153
- https://tom.vg/papers/heist_blackhat2016.pdf
- http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages
- http://www.securityfocus.com/bid/92773
- http://www.securitytracker.com/id/1036741
- http://www.securitytracker.com/id/1036742
- http://www.securitytracker.com/id/1036743
- http://www.securitytracker.com/id/1036744
- http://www.securitytracker.com/id/1036745
- http://www.securitytracker.com/id/1036746
Связанные уязвимости
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
The HTTP/2 protocol does not consider the role of the TCP congestion w ...