CVE-2012-4929
Publication date 15 September 2012
Last updated 24 July 2024
Ubuntu priority
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
apache2 | ||
chromium-browser | ||
nss | ||
openssl | ||
openssl098 | ||
qt4-x11 | ||
Notes
jdstrand
Fedora/RedHat has a patch to check for OPENSSL_NO_DEFAULT_ZLIB that can be used to mitigate this flaw. See RedHat bug #857051 No patch for upstream OpenSSL. This may be considered a flaw in the applications using OpenSSL and not OpenSSL itself.
mdeslaur
adding apache2, we should backport the SSLCompression option. in trunk and 2.4, sslcompression defaults to off with a second commit. Second commit to default to off isn't in 2.2 yet. redhat disabled zlib compression by default in openssl: https://rhn.redhat.com/errata/RHSA-2013-0587.html
Patch details
Package | Patch details |
---|---|
apache2 |
|
chromium-browser | |
openssl | |
qt4-x11 |
References
Related Ubuntu Security Notices (USN)
- USN-1898-1
- OpenSSL vulnerability
- 4 July 2013
- USN-1628-1
- Qt vulnerability
- 8 November 2012
- USN-1627-1
- Apache HTTP Server vulnerabilities
- 8 November 2012
Other references
- https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212
- https://gist.github.com/3696912
- https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
- https://chromiumcodereview.appspot.com/10825183
- https://bugzilla.redhat.com/show_bug.cgi?id=857051
- http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
- http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
- http://www.ekoparty.org/2012/thai-duong.php
- http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512
- http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
- http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor
- http://news.ycombinator.com/item?id=4510829
- http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
- http://code.google.com/p/chromium/issues/detail?id=139744
- http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
- http://permalink.gmane.org/gmane.comp.lib.qt.devel/6729
- https://www.cve.org/CVERecord?id=CVE-2012-4929