CVE-2012-4930

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
2.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 46%
VendorProductVersion
googlechrome
*
mozillafirefox
*
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chromium-browser
quantal
not-affected
precise
Fixed 23.0.1271.97-0ubuntu0.12.04.1
released
oneiric
Fixed 23.0.1271.97-0ubuntu0.11.10.1
released
natty
ignored
lucid
Fixed 23.0.1271.97-0ubuntu0.10.04.1
released
hardy
dne
firefox
quantal
Fixed 15.0+build1-0ubuntu1
released
precise
not-affected
oneiric
not-affected
natty
not-affected
lucid
not-affected
hardy
ignored
openssl
quantal
ignored
precise
ignored
oneiric
not-affected
natty
not-affected
lucid
not-affected
hardy
not-affected
Common Weakness Enumeration