Transport Layer Security (TLS) Protocol CRIME Vulnerability

Medium Nessus Plugin ID 62565

Synopsis

The remote service has a configuration that may make it vulnerable to the CRIME attack.

Description

The remote service has one of two configurations that are known to be required for the CRIME attack :

- SSL / TLS compression is enabled.

- TLS advertises the SPDY protocol earlier than version 4.

Note that Nessus did not attempt to launch the CRIME attack against the remote service.

Solution

Disable compression and / or the SPDY service.

See Also

https://www.iacr.org/cryptodb/data/paper.php?pubkey=3091

https://discussions.nessus.org/thread/5546

http://www.nessus.org/u?c44d5826

https://bz.apache.org/bugzilla/show_bug.cgi?id=53219

Plugin Details

Severity: Medium

ID: 62565

File Name: ssl_crime.nasl

Version: 1.13

Type: remote

Family: General

Published: 2012/10/16

Modified: 2018/11/15

Dependencies: 62563, 62564

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Required KB Items: SSL/Supported

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2012/09/15

Reference Information

CVE: CVE-2012-4929, CVE-2012-4930

BID: 55704, 55707