2.6
CVSSv2

CVE-2012-4930

Published: 15/09/2012 Updated: 30/01/2013
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

The SPDY protocol 3 and previous versions, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle malicious users to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

mozilla firefox

Vendor Advisories

Mozilla Foundation Security Advisory 2012-73 SPDY information disclosure Announced September 21, 2012 Reporter Thai Duong, Juliano Rizzo Impact High Products Firefox, SeaMonkey Fixed in ...