CVE-2014-3166

The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.
References
Link Resource
http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html
http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
http://secunia.com/advisories/59693
http://secunia.com/advisories/59904
http://secunia.com/advisories/60685
http://secunia.com/advisories/60798
http://security.gentoo.org/glsa/glsa-201408-16.xml
http://www.debian.org/security/2014/dsa-3039
http://www.ietf.org/mail-archive/web/tls/current/msg13345.html
http://www.securityfocus.com/bid/69202
http://www.securitytracker.com/id/1030732
https://code.google.com/p/chromium/issues/detail?id=398925
https://src.chromium.org/viewvc/chrome?revision=286598&view=revision
https://src.chromium.org/viewvc/chrome?revision=288435&view=revision
http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html
http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
http://secunia.com/advisories/59693
http://secunia.com/advisories/59904
http://secunia.com/advisories/60685
http://secunia.com/advisories/60798
http://security.gentoo.org/glsa/glsa-201408-16.xml
http://www.debian.org/security/2014/dsa-3039
http://www.ietf.org/mail-archive/web/tls/current/msg13345.html
http://www.securityfocus.com/bid/69202
http://www.securitytracker.com/id/1030732
https://code.google.com/p/chromium/issues/detail?id=398925
https://src.chromium.org/viewvc/chrome?revision=286598&view=revision
https://src.chromium.org/viewvc/chrome?revision=288435&view=revision
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:07

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - () http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html -
References () http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - () http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html -
References () http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - () http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html -
References () http://secunia.com/advisories/59693 - () http://secunia.com/advisories/59693 -
References () http://secunia.com/advisories/59904 - () http://secunia.com/advisories/59904 -
References () http://secunia.com/advisories/60685 - () http://secunia.com/advisories/60685 -
References () http://secunia.com/advisories/60798 - () http://secunia.com/advisories/60798 -
References () http://security.gentoo.org/glsa/glsa-201408-16.xml - () http://security.gentoo.org/glsa/glsa-201408-16.xml -
References () http://www.debian.org/security/2014/dsa-3039 - () http://www.debian.org/security/2014/dsa-3039 -
References () http://www.ietf.org/mail-archive/web/tls/current/msg13345.html - () http://www.ietf.org/mail-archive/web/tls/current/msg13345.html -
References () http://www.securityfocus.com/bid/69202 - () http://www.securityfocus.com/bid/69202 -
References () http://www.securitytracker.com/id/1030732 - () http://www.securitytracker.com/id/1030732 -
References () https://code.google.com/p/chromium/issues/detail?id=398925 - () https://code.google.com/p/chromium/issues/detail?id=398925 -
References () https://src.chromium.org/viewvc/chrome?revision=286598&view=revision - () https://src.chromium.org/viewvc/chrome?revision=286598&view=revision -
References () https://src.chromium.org/viewvc/chrome?revision=288435&view=revision - () https://src.chromium.org/viewvc/chrome?revision=288435&view=revision -

10 Nov 2022, 17:55

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
CVSS v2 : 5.0
v3 : unknown
v2 : 4.3
v3 : unknown
References (SECUNIA) http://secunia.com/advisories/59693 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/59693 - Broken Link, Third Party Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Release Notes, Vendor Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Release Notes, Vendor Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Release Notes, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/69202 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/69202 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id/1030732 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1030732 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/60685 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/60685 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59904 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/59904 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/60798 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/60798 - Broken Link, Third Party Advisory
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Vendor Advisory (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Exploit, Issue Tracking, Mailing List, Vendor Advisory

Information

Published : 2014-08-13 04:57

Updated : 2024-11-21 02:07


NVD link : CVE-2014-3166

Mitre link : CVE-2014-3166

CVE.ORG link : CVE-2014-3166


JSON object : View

Products Affected

google

  • android
  • chrome

apple

  • iphone_os
  • mac_os_x

microsoft

  • windows

debian

  • debian_linux

linux

  • linux_kernel