First published: Thu Sep 13 2012(Updated: )
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Google Chrome | ||
Firefox |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4929 is considered a medium to high severity vulnerability that can lead to man-in-the-middle attacks.
To fix CVE-2012-4929, update affected software such as Mozilla Firefox and Google Chrome to the latest versions.
CVE-2012-4929 affects TLS protocol 1.2 and earlier versions in browsers like Firefox, Chrome, and operating systems like Debian 7.0 and 8.0.
CVE-2012-4929 enables man-in-the-middle attackers to exploit vulnerabilities in TLS compression to obtain plaintext HTTP headers.
While CVE-2012-4929 has been addressed in later software versions, it may still pose a threat for users operating outdated versions of affected software.