2.6 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:N/A:N
5.4 Medium
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
61.6%
The TLS protocol 1.2 and earlier can encrypt compressed data without
properly obfuscating the length of the unencrypted data, which allows
machine-in-the-middle attackers to obtain plaintext content by observing
length differences during a series of guesses in which a provided string
potentially matches an unknown string in encrypted and compressed traffic.
This is known as a CRIME attack in HTTP. Other protocols layered on top of
TLS may also make these attacks practical.
This update disables compression for all programs using SSL and TLS
provided by the OpenSSL library. To re-enable compression for programs
that need compression to communicate with legacy services, define the
variable OPENSSL_DEFAULT_ZLIB in the program’s environment.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 13.04 | noarch | libssl1.0.0 | < 1.0.1c-4ubuntu8.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | libcrypto1.0.0-udeb | < 1.0.1c-4ubuntu8.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | libssl-dev | < 1.0.1c-4ubuntu8.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | libssl1.0.0-dbg | < 1.0.1c-4ubuntu8.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | libssl1.0.0-udeb | < 1.0.1c-4ubuntu8.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | openssl | < 1.0.1c-4ubuntu8.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | libssl1.0.0 | < 1.0.1c-3ubuntu2.5 | UNKNOWN |
Ubuntu | 12.10 | noarch | libcrypto1.0.0-udeb | < 1.0.1c-3ubuntu2.5 | UNKNOWN |
Ubuntu | 12.10 | noarch | libssl-dev | < 1.0.1c-3ubuntu2.5 | UNKNOWN |
Ubuntu | 12.10 | noarch | libssl1.0.0-dbg | < 1.0.1c-3ubuntu2.5 | UNKNOWN |