The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/ - Technical Description | |
References | () http://www.securityfocus.com/bid/92773 - | |
References | () http://www.securitytracker.com/id/1036741 - | |
References | () http://www.securitytracker.com/id/1036742 - | |
References | () http://www.securitytracker.com/id/1036743 - | |
References | () http://www.securitytracker.com/id/1036744 - | |
References | () http://www.securitytracker.com/id/1036745 - | |
References | () http://www.securitytracker.com/id/1036746 - | |
References | () https://tom.vg/papers/heist_blackhat2016.pdf - Technical Description |
Information
Published : 2016-09-06 10:59
Updated : 2024-11-21 02:57
NVD link : CVE-2016-7153
Mitre link : CVE-2016-7153
CVE.ORG link : CVE-2016-7153
JSON object : View
Products Affected
mozilla
- firefox
apple
- safari
opera
- opera_browser
- chrome
microsoft
- edge
- internet_explorer
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor