CVE-2012-4929 (retired)

Priority
Description
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google
Chrome, Qt, and other products, can encrypt compressed data without
properly obfuscating the length of the unencrypted data, which allows
man-in-the-middle attackers to obtain plaintext HTTP headers by observing
length differences during a series of guesses in which a string in an HTTP
request potentially matches an unknown string in an HTTP header, aka a
"CRIME" attack.
Notes
 jdstrand> Fedora/RedHat has a patch to check for OPENSSL_NO_DEFAULT_ZLIB that
  can be used to mitigate this flaw. See RedHat bug #857051
 jdstrand> No patch for upstream OpenSSL. This may be considered a flaw in the
  applications using OpenSSL and not OpenSSL itself.
 mdeslaur> adding apache2, we should backport the SSLCompression option.
 mdeslaur> in trunk and 2.4, sslcompression defaults to off with a second
 mdeslaur> commit. Second commit to default to off isn't in 2.2 yet.
 mdeslaur> redhat disabled zlib compression by default in openssl:
 mdeslaur> https://rhn.redhat.com/errata/RHSA-2013-0587.html
Package
Upstream:pending (22)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (22.0.1229.94~r161065-0ubuntu1)
Patches:
Upstream:https://chromiumcodereview.appspot.com/10825183
Package
Source: nss (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (code-not-compiled)
Package
Upstream:needs-triage
Ubuntu 14.04 LTS (Trusty Tahr):ignored
More Information

Updated: 2019-03-26 12:04:21 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)