2.6
CVSSv2

CVE-2012-4929

Published: 15/09/2012 Updated: 22/04/2018
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 235
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

The TLS protocol 1.2 and previous versions, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle malicious users to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 7.0

debian debian linux 8.0

google chrome

mozilla firefox

Vendor Advisories

Synopsis Moderate: openssl security update Type/Severity Security Advisory: Moderate Topic Updated openssl packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulne ...
Synopsis Important: rhev-hypervisor6 security and bug fix update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes several security issues andvarious bugs is now availableThe Red Hat Security Response Team has rated this update as havingimportant security impac ...
Debian Bug report logs - #732754 openssl: CVE-2013-6449: crash when using TLS 12 Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 21 Dec ...
Debian Bug report logs - #765539 Not possible to disable SSLv3 Package: pound; Maintainer for pound is Carsten Leonhardt <leo@debianorg>; Source for pound is src:pound (PTS, buildd, popcon) Reported by: Brian May <brian@microcomaustraliacomau> Date: Thu, 16 Oct 2014 01:09:02 UTC Severity: important Tags: security ...
Qt applications could be made to expose sensitive information over the network ...
Applications could be made to expose sensitive information over the network ...
Several security issues were fixed in the Apache HTTP server ...
It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites were used A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL or DTLS server as a padding oracle (CVE-2013-0169) A NULL pointer dereference ...
Several vulnerabilities were discovered in the TLS/SSL protocol This update addresses these protocol vulnerabilities in lighttpd CVE-2009-3555 Marsh Ray, Steve Dispensa, and Martin Rex discovered that the TLS and SSLv3 protocols do not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle ...
Pound, a HTTP reverse proxy and load balancer, had several issues related to vulnerabilities in the Secure Sockets Layer (SSL) protocol For Debian 7 (wheezy) this update adds a missing part to make it actually possible to disable client-initiated renegotiation and disables it by default (CVE-2009-3555) TLS compression is disabled (CVE-2012-4929), ...
Juliano Rizzo and Thai Duong discovered a weakness in the TLS/SSL protocol when using compression This side channel attack, dubbed CRIME, allows eavesdroppers to gather information to recover the original plaintext in the protocol This update to nginx disables SSL compression For the stable distribution (squeeze), this problem has been fixed in ...
A vulnerability has been found in the Apache HTTPD Server: CVE-2012-4557 A flaw was found when mod_proxy_ajp connects to a backend server that takes too long to respond Given a specific configuration, a remote attacker could send certain requests, putting a backend server into an error state until the retry timeout expired This could lead t ...

Github Repositories

This repository contains specifications and the public issue tracker for the Czech Standard for Banking IDentity Assurance.

Czech Standard for Banking IDentity Assurance Overview of changes Version Note 10 Basic document - see 11 New version 11 Added new optional element paymentAccountsDetails as list of client accounts (profile endpoint) and added element birthcountry (profile endpoint) see profile Open API specification 11 Added new types of ID cards see the attachment profile Open

A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner

Web Application Security Scanner ____ _ _ ____ __ __ __ ____ ( _ \( \/ )(_ _)/ \ / \ ( ) / ___) ) __/ ) / )( ( O )( O )/ (_/\\___ \ (__) (__/ (__) \__/ \__/ \____/(____/ [] Fast and customizable vulnerability scanner based on simple Python Frontend framework detection Content Delivery Network detection De

ARC Vulnerability Scanner provides insights on security deficiencies in an environment and helps to evaluate a system's vulnerability to a specific threat.

ARC - Vulnerability Scanner ARC Scanner is basically an update for WAScan making it compatible for python >= 34 It allows more flexibility for you to write new modules and implement new features : Frontend framework detection Content Delivery Network detection Define Risk Level to allow for scans Plugin system Docker image available to build and run Requirement Warnin

FrameworkProjes

Sitadel - Web Application Security Scanner Sitadel is basically an update for WAScan making it compatible for python >= 34 It allows more flexibility for you to write new modules and implement new features : Frontend framework detection Content Delivery Network detection Define Risk Level to allow for scans Plugin system Docker image available to build and run Requ

Web Application Security Scanner

Sitadel - Web Application Security Scanner _ _ _ _____ _ _ _ | |_| |_| | / _____|_) _ | | | | | | ( (____ _ _| |_ _____ __| |_____| | | _ | \____ \| (_ _|____ |/ _ | ___ | | | |_| | _____) ) | | |_/ ___ ( (_| | ____| | | | (______/|_| \__)_____|\____|_____)\_)

Sitadel - Web Application Security Scanner Sitadel is basically an update for WAScan making it compatible for python >= 34 It allows more flexibility for you to write new modules and implement new features : Frontend framework detection Content Delivery Network detection Define Risk Level to allow for scans Plugin system Docker image available to build and run Requ

Wap-Recon is an Open Source web application scanner, it is designed to find various default and insecure files, configurations, and misconfigurations. Wap-Recon is built on python2.7 and can run on any platform which has a Python environment.

Wap-Recon - Web Application Security Scanner Wap-Recon is an Open Source web application scanner, it is designed to find various default and insecure files, configurations, and misconfigurations Wap-Recon is built on python27 and can run on any platform which has a Python environment Installation $ git clone githubcom/mohitrex7/Wap-Recongit $ cd Wap-Recon/ $ pip in

🔪 CRIME attack PoC : a compression oracle attacks CVE-2012-4929 🔪

CRIME-poc CRIME attack : a compression oracle attacks CVE-2012-4929 discovered by Juliano Rizzo and Thai Duong; In a compression oracle attack the use of adaptive data compression on a mixture of chosen plaintext and unknown plaintext can result in content-sensitive changes in the length of the compressed text that can be detected even though the content of the compressed text

Spaghetti - Web Application Security Scanner Spaghetti is an Open Source web application scanner, it is designed to find various default and insecure files, configurations, and misconfigurations Spaghetti is built on python27 and can run on any platform which has a Python environment Installation $ git clone githubcom/m4ll0k/Spaghettigit $ cd Spaghetti $ pip

tag - Web Application Security Scanner tag is an Open Source web application scanner, it is designed to find various default and insecure files, configurations, and misconfigurations tag is built on python27 and can run on any platform which has a Python environment Installation $ git clone githubcom/tag888/tag123git $ cd tag $ pip install -r requirementstxt

Docker image to exploit CRIME vulnerability

This Docker image is based on the yamamuteki/debian-etch-i386 Debian Etch docker image The main purpose of this docker image is to create a vulnerable environment to exploit CRIME To run this image after installing Docker, use a command like this: $ sudo docker run --rm -p 443:443 jselvi/crime Now you can test if we are facing a vulnerab

Домашнее задание к занятию "21 Системы контроля версий" В каталоге terraform будут проигнорированы файлы: все файлы и каталоги в каталоге terraform файлы, содержащие tfstate файлы с именем crashlog файлы с расширени

SecurEagle - Web Application Security Scanner █████████ ██████████ ████ ███░░░░░███ ░░███░░░░░█ ░░███ ░█

CEH certification

🌐 💻 🔐 CEH - Knowledges CEH certification 🌌 This repository is here to help for the CEH The terminology and the information are from : Udemy: CEH v11 312-50: Certified Ethical Hacker Practice Exams NEW (Good questions and answers well explained) 🔧 TOOLS Nmap – to scan open port (old name was Ethereal) -sS (TCP SYN (Stealth) Scan) It is the fastest and m

References

CWE-310http://www.ekoparty.org/2012/thai-duong.phphttp://www.iacr.org/cryptodb/data/paper.php?pubkey=3091http://code.google.com/p/chromium/issues/detail?id=139744http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512https://chromiumcodereview.appspot.com/10825183https://gist.github.com/3696912http://news.ycombinator.com/item?id=4510829http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/http://www.theregister.co.uk/2012/09/14/crime_tls_attack/http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successorhttps://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltlshttps://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=857051http://www.ubuntu.com/usn/USN-1628-1http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.htmlhttp://www.debian.org/security/2012/dsa-2579http://www.ubuntu.com/usn/USN-1627-1http://www.securityfocus.com/bid/55704http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.htmlhttp://lists.opensuse.org/opensuse-updates/2013-01/msg00048.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0587.htmlhttp://www.debian.org/security/2013/dsa-2627http://support.apple.com/kb/HT5784http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.htmlhttp://www.ubuntu.com/usn/USN-1898-1http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.htmlhttp://www.debian.org/security/2015/dsa-3253http://jvn.jp/en/jp/JVN65273415/index.htmlhttp://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.htmlhttp://marc.info/?l=bugtraq&m=136612293908376&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920https://github.com/mpgn/CRIME-pochttps://access.redhat.com/errata/RHSA-2013:0587https://nvd.nist.govhttps://usn.ubuntu.com/1628-1/