The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
References
Link | Resource |
---|---|
http://breachattack.com/ | Third Party Advisory |
http://github.com/meldium/breach-mitigation-rails | Third Party Advisory |
http://security.stackexchange.com/questions/20406/is-http-compression-safe#20407 | Exploit Third Party Advisory |
http://slashdot.org/story/13/08/05/233216 | Third Party Advisory |
http://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf | Third Party Advisory |
http://www.kb.cert.org/vuls/id/987798 | Third Party Advisory US Government Resource |
https://bugzilla.redhat.com/show_bug.cgi?id=995168 | Issue Tracking Third Party Advisory |
https://hackerone.com/reports/254895 | Exploit Third Party Advisory |
https://lists.apache.org/thread.html/r7f0e9cfd166934172d43ca4c272b8bdda4a343036229d9937affd1e1%40%3Cdev.httpd.apache.org%3E | |
https://support.f5.com/csp/article/K14634 | Third Party Advisory |
https://www.blackhat.com/us-13/briefings.html#Prado | Third Party Advisory |
https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2020-02-21T17:11:47
Updated: 2021-04-10T00:06:26
Reserved: 2013-05-21T00:00:00
Link: CVE-2013-3587
JSON object: View
NVD Information
Status : Modified
Published: 2020-02-21T18:15:11.427
Modified: 2023-11-07T02:15:59.040
Link: CVE-2013-3587
JSON object: View
Redhat Information
No data.
CWE