Lucene search

K
ubuntucveUbuntu.comUB:CVE-2012-4929
HistorySep 15, 2012 - 12:00 a.m.

CVE-2012-4929

2012-09-1500:00:00
ubuntu.com
ubuntu.com
14

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

60.9%

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google
Chrome, Qt, and other products, can encrypt compressed data without
properly obfuscating the length of the unencrypted data, which allows
man-in-the-middle attackers to obtain plaintext HTTP headers by observing
length differences during a series of guesses in which a string in an HTTP
request potentially matches an unknown string in an HTTP header, aka a
“CRIME” attack.

Bugs

Notes

Author Note
jdstrand Fedora/RedHat has a patch to check for OPENSSL_NO_DEFAULT_ZLIB that can be used to mitigate this flaw. See RedHat bug #857051 No patch for upstream OpenSSL. This may be considered a flaw in the applications using OpenSSL and not OpenSSL itself.
mdeslaur adding apache2, we should backport the SSLCompression option. in trunk and 2.4, sslcompression defaults to off with a second commit. Second commit to default to off isn’t in 2.2 yet. redhat disabled zlib compression by default in openssl: https://rhn.redhat.com/errata/RHSA-2013-0587.html
OSVersionArchitecturePackageVersionFilename
ubuntu8.04noarchapache2< 2.2.8-1ubuntu0.24UNKNOWN
ubuntu10.04noarchapache2< 2.2.14-5ubuntu8.10UNKNOWN
ubuntu11.10noarchapache2< 2.2.20-1ubuntu1.3UNKNOWN
ubuntu12.04noarchapache2< 2.2.22-1ubuntu1.2UNKNOWN
ubuntu12.10noarchapache2< 2.2.22-6ubuntu2.1UNKNOWN
ubuntu13.04noarchapache2< 2.2.22-6ubuntu3UNKNOWN
ubuntu13.10noarchapache2< 2.2.22-6ubuntu3UNKNOWN
ubuntu10.04noarchchromium-browser< 23.0.1271.97-0ubuntu0.10.04.1UNKNOWN
ubuntu11.10noarchchromium-browser< 23.0.1271.97-0ubuntu0.11.10.1UNKNOWN
ubuntu12.04noarchchromium-browser< 23.0.1271.97-0ubuntu0.12.04.1UNKNOWN
Rows per page:
1-10 of 211

References

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

60.9%