CVE-2014-3166

The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.
References
Link Resource
http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html
http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
http://secunia.com/advisories/59693
http://secunia.com/advisories/59904
http://secunia.com/advisories/60685
http://secunia.com/advisories/60798
http://security.gentoo.org/glsa/glsa-201408-16.xml
http://www.debian.org/security/2014/dsa-3039
http://www.ietf.org/mail-archive/web/tls/current/msg13345.html
http://www.securityfocus.com/bid/69202
http://www.securitytracker.com/id/1030732
https://code.google.com/p/chromium/issues/detail?id=398925
https://src.chromium.org/viewvc/chrome?revision=286598&view=revision
https://src.chromium.org/viewvc/chrome?revision=288435&view=revision
http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html
http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
http://secunia.com/advisories/59693
http://secunia.com/advisories/59904
http://secunia.com/advisories/60685
http://secunia.com/advisories/60798
http://security.gentoo.org/glsa/glsa-201408-16.xml
http://www.debian.org/security/2014/dsa-3039
http://www.ietf.org/mail-archive/web/tls/current/msg13345.html
http://www.securityfocus.com/bid/69202
http://www.securitytracker.com/id/1030732
https://code.google.com/p/chromium/issues/detail?id=398925
https://src.chromium.org/viewvc/chrome?revision=286598&view=revision
https://src.chromium.org/viewvc/chrome?revision=288435&view=revision
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:07

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - () http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html -
References () http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - () http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html -
References () http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - () http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html -
References () http://secunia.com/advisories/59693 - () http://secunia.com/advisories/59693 -
References () http://secunia.com/advisories/59904 - () http://secunia.com/advisories/59904 -
References () http://secunia.com/advisories/60685 - () http://secunia.com/advisories/60685 -
References () http://secunia.com/advisories/60798 - () http://secunia.com/advisories/60798 -
References () http://security.gentoo.org/glsa/glsa-201408-16.xml - () http://security.gentoo.org/glsa/glsa-201408-16.xml -
References () http://www.debian.org/security/2014/dsa-3039 - () http://www.debian.org/security/2014/dsa-3039 -
References () http://www.ietf.org/mail-archive/web/tls/current/msg13345.html - () http://www.ietf.org/mail-archive/web/tls/current/msg13345.html -
References () http://www.securityfocus.com/bid/69202 - () http://www.securityfocus.com/bid/69202 -
References () http://www.securitytracker.com/id/1030732 - () http://www.securitytracker.com/id/1030732 -
References () https://code.google.com/p/chromium/issues/detail?id=398925 - () https://code.google.com/p/chromium/issues/detail?id=398925 -
References () https://src.chromium.org/viewvc/chrome?revision=286598&view=revision - () https://src.chromium.org/viewvc/chrome?revision=286598&view=revision -
References () https://src.chromium.org/viewvc/chrome?revision=288435&view=revision - () https://src.chromium.org/viewvc/chrome?revision=288435&view=revision -

07 Nov 2023, 02:19

Type Values Removed Values Added
References (DEBIAN) http://www.debian.org/security/2014/dsa-3039 - Third Party Advisory () http://www.debian.org/security/2014/dsa-3039 -
References (CONFIRM) https://src.chromium.org/viewvc/chrome?revision=286598&view=revision - Third Party Advisory () https://src.chromium.org/viewvc/chrome?revision=286598&view=revision -
References (SECUNIA) http://secunia.com/advisories/60798 - Broken Link, Third Party Advisory () http://secunia.com/advisories/60798 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html -
References (SECUNIA) http://secunia.com/advisories/59904 - Broken Link, Third Party Advisory () http://secunia.com/advisories/59904 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html -
References (SECUNIA) http://secunia.com/advisories/60685 - Broken Link, Third Party Advisory () http://secunia.com/advisories/60685 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html -
References (CONFIRM) https://src.chromium.org/viewvc/chrome?revision=288435&view=revision - Third Party Advisory () https://src.chromium.org/viewvc/chrome?revision=288435&view=revision -
References (MLIST) http://www.ietf.org/mail-archive/web/tls/current/msg13345.html - Third Party Advisory () http://www.ietf.org/mail-archive/web/tls/current/msg13345.html -
References (SECTRACK) http://www.securitytracker.com/id/1030732 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1030732 -
References (SECUNIA) http://secunia.com/advisories/59693 - Broken Link, Third Party Advisory () http://secunia.com/advisories/59693 -
References (GENTOO) http://security.gentoo.org/glsa/glsa-201408-16.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201408-16.xml -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Exploit, Issue Tracking, Mailing List, Vendor Advisory () https://code.google.com/p/chromium/issues/detail?id=398925 -
References (BID) http://www.securityfocus.com/bid/69202 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/69202 -

Information

Published : 2014-08-13 04:57

Updated : 2024-11-21 02:07


NVD link : CVE-2014-3166

Mitre link : CVE-2014-3166

CVE.ORG link : CVE-2014-3166


JSON object : View

Products Affected

linux

  • linux_kernel

microsoft

  • windows

apple

  • mac_os_x
  • iphone_os

google

  • chrome
  • android

debian

  • debian_linux