First published: Tue Sep 06 2016(Updated: )
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Edge Beta | ||
Internet Explorer | ||
Google Chrome (Trace Event) | ||
Apple Mobile Safari | ||
Opera | ||
Firefox |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7153 has been assigned a medium severity rating due to its potential to leak sensitive information.
To fix CVE-2016-7153, ensure that your web browser is updated to the latest version provided by the browser vendor.
CVE-2016-7153 affects multiple browsers, including Microsoft Edge, Internet Explorer, Google Chrome, Apple Mobile Safari, Opera, and Mozilla Firefox.
CVE-2016-7153 is associated with a HEIST attack, which allows attackers to exploit improperly handled data in HTTP/2.
Yes, CVE-2016-7153 can lead to the exposure of sensitive data such as user credentials if exploited.