CVE-2013-3587
21.02.2020, 18:15
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.Enginsight
Vendor | Product | Version |
---|---|---|
f5 | big-ip_access_policy_manager | 10.1.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_access_policy_manager | 11.0.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_access_policy_manager | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_access_policy_manager | 13.0.0 |
f5 | big-ip_advanced_firewall_manager | 11.3.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_advanced_firewall_manager | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_advanced_firewall_manager | 13.0.0 |
f5 | big-ip_analytics | 11.0.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_analytics | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_analytics | 13.0.0 |
f5 | big-ip_application_acceleration_manager | 11.4.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_application_acceleration_manager | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_application_acceleration_manager | 13.0.0 |
f5 | big-ip_application_security_manager | 9.2.0 ≤ 𝑥 ≤ 9.4.8 |
f5 | big-ip_application_security_manager | 10.0.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_application_security_manager | 11.0.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_application_security_manager | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_application_security_manager | 13.0.0 |
f5 | big-ip_edge_gateway | 10.1.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_edge_gateway | 11.0.0 ≤ 𝑥 ≤ 11.3.0 |
f5 | big-ip_link_controller | 9.2.2 ≤ 𝑥 ≤ 9.4.8 |
f5 | big-ip_link_controller | 10.0.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_link_controller | 11.0.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_link_controller | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_link_controller | 13.0.0 |
f5 | big-ip_local_traffic_manager | 9.0.0 ≤ 𝑥 ≤ 9.6.1 |
f5 | big-ip_local_traffic_manager | 10.0.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_local_traffic_manager | 11.0.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_local_traffic_manager | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_local_traffic_manager | 13.0.0 |
f5 | big-ip_policy_enforcement_manager | 11.3.0 ≤ 𝑥 ≤ 11.6.1 |
f5 | big-ip_policy_enforcement_manager | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_policy_enforcement_manager | 13.0.0 |
f5 | big-ip_protocol_security_module | 9.4.5 ≤ 𝑥 ≤ 9.4.8 |
f5 | big-ip_protocol_security_module | 10.0.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_protocol_security_module | 11.0.0 ≤ 𝑥 ≤ 11.4.1 |
f5 | big-ip_wan_optimization_manager | 10.0.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_wan_optimization_manager | 11.0.0 ≤ 𝑥 ≤ 11.3.0 |
f5 | big-ip_webaccelerator | 9.4.0 ≤ 𝑥 ≤ 9.4.8 |
f5 | big-ip_webaccelerator | 10.0.0 ≤ 𝑥 ≤ 10.2.4 |
f5 | big-ip_webaccelerator | 11.0.0 ≤ 𝑥 ≤ 11.3.0 |
f5 | firepass | 6.0.0 ≤ 𝑥 ≤ 6.1.0 |
f5 | firepass | 7.0.0 |
f5 | arx | 5.0.0 ≤ 𝑥 ≤ 5.3.1 |
f5 | arx | 6.0.0 ≤ 𝑥 ≤ 6.4.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References