Lucene search

K
mozillaMozilla FoundationMFSA2012-73
HistorySep 21, 2012 - 12:00 a.m.

SPDY information disclosure — Mozilla

2012-09-2100:00:00
Mozilla Foundation
www.mozilla.org
41

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

EPSS

0.003

Percentile

65.1%

Security researchers Thai Duong and Juliano Rizzo reported that SPDY’s request header compression leads to information leakage, which can allow the extraction of private data such as session cookies, even over an encrypted SSL connection.

Affected configurations

Vulners
Node
mozillafirefoxRange<15
OR
mozillaseamonkeyRange<2.12
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

EPSS

0.003

Percentile

65.1%