First published: Tue Sep 06 2016(Updated: )
The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opera | ||
Apple Mobile Safari | ||
Firefox | ||
Microsoft Edge Beta | ||
Internet Explorer | ||
Google Chrome (Trace Event) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7152 is classified as a high severity vulnerability due to its potential to allow attackers to obtain sensitive data.
To mitigate CVE-2016-7152, users should update their web browsers to the latest versions as they include patches for this vulnerability.
CVE-2016-7152 affects several browsers including Opera, Apple Mobile Safari, Mozilla Firefox, Microsoft Edge, Internet Explorer, and Google Chrome.
CVE-2016-7152 facilitates a HEIST attack, which can be used to extract cleartext data from HTTPS pages.
Yes, CVE-2016-7152 can be exploited remotely if the specific browser configurations are in place.