Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-4930

Опубликовано: 15 сент. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.6

Описание

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

РелизСтатусПримечание
devel

not-affected

22.0.1229.94~r161065-0ubuntu1
hardy

DNE

lucid

released

23.0.1271.97-0ubuntu0.10.04.1
natty

ignored

end of life
oneiric

released

23.0.1271.97-0ubuntu0.11.10.1
precise

released

23.0.1271.97-0ubuntu0.12.04.1
quantal

not-affected

22.0.1229.94~r161065-0ubuntu1
upstream

pending

22

Показывать по

РелизСтатусПримечание
devel

released

15.0+build1-0ubuntu1
hardy

ignored

end of life
lucid

not-affected

natty

not-affected

oneiric

not-affected

precise

not-affected

quantal

released

15.0+build1-0ubuntu1
upstream

released

15.0

Показывать по

РелизСтатусПримечание
devel

ignored

hardy

not-affected

lucid

not-affected

natty

not-affected

oneiric

not-affected

1.0.0e-2ubuntu4.6
precise

ignored

quantal

ignored

upstream

needs-triage

Показывать по

EPSS

Процентиль: 46%
0.00236
Низкий

2.6 Low

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

nvd
больше 13 лет назад

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

debian
больше 13 лет назад

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Ch ...

github
больше 3 лет назад

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

EPSS

Процентиль: 46%
0.00236
Низкий

2.6 Low

CVSS2