Vulnerability Details : CVE-2012-4929
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
Exploit prediction scoring system (EPSS) score for CVE-2012-4929
Probability of exploitation activity in the next 30 days: 0.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 61 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4929
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:P/I:N/A:N |
4.9
|
2.9
|
NIST |
CWE ids for CVE-2012-4929
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4929
-
http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor
tls - CRIME - How to beat the BEAST successor? - Information Security Stack Exchange
-
http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html
JVNDB-2016-000129 - JVN iPedia
-
http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
Details on the "Crime" Attack
-
http://www.debian.org/security/2015/dsa-3253
Debian -- Security Information -- DSA-3253-1 pound
-
http://www.debian.org/security/2012/dsa-2579
Debian -- Security Information -- DSA-2579-1 apache2
-
http://support.apple.com/kb/HT5784
About the security content of OS X Mountain Lion v10.8.4 and Security Update 2013-002 - Apple Support
-
http://www.ubuntu.com/usn/USN-1628-1
USN-1628-1: Qt vulnerability | Ubuntu security notices
-
http://www.ubuntu.com/usn/USN-1898-1
USN-1898-1: OpenSSL vulnerability | Ubuntu security notices
-
http://rhn.redhat.com/errata/RHSA-2013-0587.html
RHSA-2013:0587 - Security Advisory - Red Hat Customer Portal
-
http://code.google.com/p/chromium/issues/detail?id=139744
139744 - Security: SSL compression infoleak - chromium - Monorail
-
http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
Paper: Compression and Information Leakage of Plaintext
-
http://marc.info/?l=bugtraq&m=136612293908376&w=2
'[security bulletin] HPSBUX02866 SSRT101139 rev.1 - HP-UX Running Apache, Remote Denial of Service (D' - MARC
-
https://bugzilla.redhat.com/show_bug.cgi?id=857051
857051 – (CRIME, CVE-2012-4929) CVE-2012-4929 SSL/TLS CRIME attack against HTTPS
-
http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
Crack in Internet’s foundation of trust allows HTTPS session hijacking | Ars Technica
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
[SECURITY] Fedora 18 Update: mingw-openssl-1.0.1e-1.fc18
-
https://chromiumcodereview.appspot.com/10825183
Issue 10825183: net: disable TLS compression with OpenSSL. - Code Review
-
http://www.debian.org/security/2013/dsa-2627
Debian -- Security Information -- DSA-2627-1 nginx
-
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
Apple - Lists.apple.com
-
http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
Threatpost | The first stop for security news
-
http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512
Threatpost | The first stop for security news
-
http://news.ycombinator.com/item?id=4510829
Google disables compression for OpenSSL in Chrome - SSL exploit coming? | Hacker News
-
https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212
Threatpost | The first stop for security news
-
http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html
openSUSE-SU-2013:0157-1: moderate: libqt4: security fixes for XMLHttpReq
-
http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html
openSUSE-SU-2013:0143-1: moderate: libqt4: security fixes for XMLHttpReq
-
http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
The perfect CRIME? New HTTPS web hijack attack explained • The Register
-
http://www.securityfocus.com/bid/55704
TLS Protocol CVE-2012-4929 Information Disclosure Vulnerability
-
http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html
openSUSE-SU-2012:1420-1: moderate: update for libqt4
-
https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
404 Page Not Found | Qualys, Inc.
-
https://github.com/mpgn/CRIME-poc
GitHub - mpgn/CRIME-poc: CRIME attack PoC : a compression oracle attacks CVE-2012-4929
-
http://www.ekoparty.org/2012/thai-duong.php
ekoparty security conference
-
https://gist.github.com/3696912
It's not a crime to build a CRIME · GitHub
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920
Repository / Oval Repository
-
http://www.ubuntu.com/usn/USN-1627-1
USN-1627-1: Apache HTTP Server vulnerabilities | Ubuntu security notices
-
http://jvn.jp/en/jp/JVN65273415/index.html
JVN#65273415: Android OS issue where it is affected by the CRIME attack
Products affected by CVE-2012-4929
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*