CVE-2012-4930

EUVD-2012-4855
The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 46%
Affected Products (NVD)
VendorProductVersion
googlechrome
*
mozillafirefox
*
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chromium-browser
hardy
dne
lucid
Fixed 23.0.1271.97-0ubuntu0.10.04.1
released
natty
ignored
oneiric
Fixed 23.0.1271.97-0ubuntu0.11.10.1
released
precise
Fixed 23.0.1271.97-0ubuntu0.12.04.1
released
quantal
not-affected
firefox
hardy
ignored
lucid
not-affected
natty
not-affected
oneiric
not-affected
precise
not-affected
quantal
Fixed 15.0+build1-0ubuntu1
released
openssl
hardy
not-affected
lucid
not-affected
natty
not-affected
oneiric
not-affected
precise
ignored
quantal
ignored
Common Weakness Enumeration