CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
65.1%
The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a âCRIMEâ attack.
arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
www.ekoparty.org/2012/thai-duong.php
www.iacr.org/cryptodb/data/paper.php?pubkey=3091
www.theregister.co.uk/2012/09/14/crime_tls_attack/
bugzilla.redhat.com/show_bug.cgi?id=857737
community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls