The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
http://www.ekoparty.org/2012/thai-duong.php
http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
88431 | F5 Networks BIG-IP : CRIME vulnerability via the SPDY protocol (K14059) | Nessus | F5 Networks Local Security Checks | low |
64133 | SuSE 11.2 Security Update : Mozilla Firefox (SAT Patch Number 6951) | Nessus | SuSE Local Security Checks | critical |
63402 | GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST) | Nessus | Gentoo Local Security Checks | critical |
62573 | SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 8327) | Nessus | SuSE Local Security Checks | critical |
62565 | Transport Layer Security (TLS) Protocol CRIME Vulnerability | Nessus | General | low |
801356 | Mozilla SeaMonkey 2.x < 2.12 Multiple Vulnerabilities | Log Correlation Engine | Web Clients | high |
6561 | SeaMonkey 2.x < 2.12 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | high |
61718 | SeaMonkey < 2.12.0 Multiple Vulnerabilities | Nessus | Windows | critical |
61715 | Firefox < 15.0 Multiple Vulnerabilities | Nessus | Windows | critical |
61711 | Firefox < 15.0 Multiple Vulnerabilities (Mac OS X) | Nessus | MacOS X Local Security Checks | critical |