2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:N/A:N
0.003 Low
EPSS
Percentile
64.6%
The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome,
and other products, can perform TLS encryption of compressed data without
properly obfuscating the length of the unencrypted data, which allows
man-in-the-middle attackers to obtain plaintext HTTP headers by observing
length differences during a series of guesses in which a string in an HTTP
request potentially matches an unknown string in an HTTP header, aka a
âCRIMEâ attack.
Author | Note |
---|---|
jdstrand | Firefox 15 disables compression For SPDY to be used with OpenSSL in any way, NPN must be available in openssl. This was not introduced until 1.0.1. No patch for upstream OpenSSL. This may be considered a flaw in the applications using OpenSSL and not OpenSSL itself. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | chromium-browser | <Â 23.0.1271.97-0ubuntu0.10.04.1 | UNKNOWN |
ubuntu | 11.10 | noarch | chromium-browser | <Â 23.0.1271.97-0ubuntu0.11.10.1 | UNKNOWN |
ubuntu | 12.04 | noarch | chromium-browser | <Â 23.0.1271.97-0ubuntu0.12.04.1 | UNKNOWN |
ubuntu | 12.10 | noarch | firefox | <Â 15.0+build1-0ubuntu1 | UNKNOWN |
arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
www.ekoparty.org/2012/thai-duong.php
www.iacr.org/cryptodb/data/paper.php?pubkey=3091
www.theregister.co.uk/2012/09/14/crime_tls_attack/
bugzilla.redhat.com/show_bug.cgi?id=857737
community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
launchpad.net/bugs/cve/CVE-2012-4930
nvd.nist.gov/vuln/detail/CVE-2012-4930
security-tracker.debian.org/tracker/CVE-2012-4930
www.cve.org/CVERecord?id=CVE-2012-4930