Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-7152

Опубликовано: 03 авг. 2016
Источник: redhat
CVSS3: 3.1
CVSS2: 2.6

Описание

The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.

Меры по смягчению последствий

Disable third-party cookies in the browser. https://support.mozilla.org/en-US/kb/disable-third-party-cookies (Firefox) https://support.google.com/chrome/answer/95647?hl=en (Google Chrome)

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7httpdNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1388003HTTPS: HEIST attack allows attackers to sniff TLS encrypted HTTP traffic

3.1 Low

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 9 лет назад

The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.

CVSS3: 5.3
nvd
больше 9 лет назад

The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.

CVSS3: 5.3
debian
больше 9 лет назад

The HTTPS protocol does not consider the role of the TCP congestion wi ...

CVSS3: 5.3
github
больше 3 лет назад

The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.

3.1 Low

CVSS3

2.6 Low

CVSS2