CVE-2014-3166

The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*

History

10 Nov 2022, 17:55

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
CVSS v2 : 5.0
v3 : unknown
v2 : 4.3
v3 : unknown
References (SECUNIA) http://secunia.com/advisories/59693 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/59693 - Broken Link, Third Party Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Release Notes, Vendor Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Release Notes, Vendor Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Release Notes, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/69202 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/69202 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id/1030732 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1030732 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/60685 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/60685 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59904 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/59904 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/60798 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/60798 - Broken Link, Third Party Advisory
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Vendor Advisory (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Exploit, Issue Tracking, Mailing List, Vendor Advisory

Information

Published : 2014-08-13 04:57

Updated : 2024-02-04 18:35


NVD link : CVE-2014-3166

Mitre link : CVE-2014-3166

CVE.ORG link : CVE-2014-3166


JSON object : View

Products Affected

apple

  • iphone_os
  • mac_os_x

microsoft

  • windows

google

  • chrome
  • android

debian

  • debian_linux

linux

  • linux_kernel