Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-7152

Published: 6 September 2016

The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.

Notes

AuthorNote
seth-arnold
NVD had this CVE assigned to multiple browers as of 2016-09-12.
This CVE appears to cover a wide variety of browser side channels
demonstrating the time difference between first byte and last byte in
a response. This can be used both for compression-based determinations
of exact strings from requests that are reflected in responses as well
as uncompressed responses from sites that have disabled compression
to mitigate BEAST or CRIME.
The paper authors recommend users disable third-party cookies
in their browsers, with the caveat that many services will break.
mdeslaur
We have no actionable item to fix this CVE.
Since we release new firefox, thunderbird and chromium upstream
releases, I'm marking this as ignored.

Priority

Low

Cvss 3 Severity Score

5.3

Score breakdown

Status

Package Release Status
chromium-browser
Launchpad, Ubuntu, Debian
trusty Does not exist
(trusty was ignored)
upstream Needed

xenial Ignored

yakkety Ignored
(end of life)
zesty Ignored

precise Ignored

firefox
Launchpad, Ubuntu, Debian
trusty Does not exist
(trusty was ignored)
upstream Needed

xenial Ignored

yakkety Ignored
(end of life)
zesty Ignored

precise Ignored
(end of life)
oxide-qt
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist
(trusty was ignored)
upstream Needs triage

xenial Ignored

yakkety Ignored
(end of life)
zesty Ignored

thunderbird
Launchpad, Ubuntu, Debian
trusty Does not exist
(trusty was ignored)
upstream Needs triage

xenial Ignored

yakkety Ignored
(end of life)
zesty Ignored

precise Ignored
(end of life)

Severity score breakdown

Parameter Value
Base score 5.3
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N