The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/ - Technical Description | |
References | () http://www.securityfocus.com/bid/92769 - | |
References | () http://www.securitytracker.com/id/1036741 - | |
References | () http://www.securitytracker.com/id/1036742 - | |
References | () http://www.securitytracker.com/id/1036743 - | |
References | () http://www.securitytracker.com/id/1036744 - | |
References | () http://www.securitytracker.com/id/1036745 - | |
References | () http://www.securitytracker.com/id/1036746 - | |
References | () https://tom.vg/papers/heist_blackhat2016.pdf - Technical Description |
Information
Published : 2016-09-06 10:59
Updated : 2024-11-21 02:57
NVD link : CVE-2016-7152
Mitre link : CVE-2016-7152
CVE.ORG link : CVE-2016-7152
JSON object : View
Products Affected
mozilla
- firefox
- chrome
microsoft
- edge
- internet_explorer
opera
- opera
apple
- safari
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor