CVE-2012-4929

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-4929
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2012-4929.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2012-4929
Downstream
Related
Published
2012-09-15T18:55:03Z
Modified
2025-08-09T19:01:26Z
Summary
[none]
Details

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

References

Affected packages