Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-4929

Опубликовано: 15 сент. 2012
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 2.6

Описание

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

РелизСтатусПримечание
devel

released

2.2.22-6ubuntu3
hardy

released

2.2.8-1ubuntu0.24
lucid

released

2.2.14-5ubuntu8.10
natty

ignored

end of life
oneiric

released

2.2.20-1ubuntu1.3
precise

released

2.2.22-1ubuntu1.2
quantal

released

2.2.22-6ubuntu2.1
raring

released

2.2.22-6ubuntu3
saucy

released

2.2.22-6ubuntu3
upstream

released

2.2.22-12

Показывать по

РелизСтатусПримечание
devel

not-affected

22.0.1229.94~r161065-0ubuntu1
hardy

DNE

lucid

released

23.0.1271.97-0ubuntu0.10.04.1
natty

ignored

end of life
oneiric

released

23.0.1271.97-0ubuntu0.11.10.1
precise

released

23.0.1271.97-0ubuntu0.12.04.1
quantal

not-affected

22.0.1229.94~r161065-0ubuntu1
raring

not-affected

22.0.1229.94~r161065-0ubuntu1
saucy

not-affected

22.0.1229.94~r161065-0ubuntu1
upstream

pending

22

Показывать по

РелизСтатусПримечание
devel

not-affected

code-not-compiled
hardy

ignored

end of life
lucid

not-affected

code-not-compiled
natty

not-affected

code-not-compiled
oneiric

not-affected

code-not-compiled
precise

not-affected

code-not-compiled
quantal

not-affected

code-not-compiled
raring

not-affected

code-not-compiled
saucy

not-affected

code-not-compiled
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

released

1.0.1e-2ubuntu1.1
hardy

ignored

end of life
lucid

released

0.9.8k-7ubuntu8.15
natty

ignored

end of life
oneiric

ignored

end of life
precise

released

1.0.1-4ubuntu5.10
quantal

released

1.0.1c-3ubuntu2.5
raring

released

1.0.1c-4ubuntu8.1
saucy

released

1.0.1e-2ubuntu1.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

ignored

hardy

DNE

lucid

DNE

natty

DNE

oneiric

ignored

end of life
precise

ignored

quantal

ignored

raring

ignored

saucy

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

released

4:4.8.3+dfsg-0ubuntu3
hardy

ignored

end of life
lucid

released

4:4.6.2-0ubuntu5.5
natty

ignored

end of life
oneiric

released

4:4.7.4-0ubuntu8.2
precise

released

4:4.8.1-0ubuntu4.3
quantal

released

4:4.8.3+dfsg-0ubuntu3
raring

released

4:4.8.3+dfsg-0ubuntu3
saucy

released

4:4.8.3+dfsg-0ubuntu3
upstream

released

4.8.4, 5.0.0

Показывать по

EPSS

Процентиль: 94%
0.13137
Средний

2.6 Low

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

nvd
почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

debian
почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google C ...

github
около 3 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

oracle-oval
больше 12 лет назад

ELSA-2013-0587: openssl security update (MODERATE)

EPSS

Процентиль: 94%
0.13137
Средний

2.6 Low

CVSS2