Red Hat Customer Portal

Skip to main content

CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Details Source

Mitre

Public Date

2012-09-13 00:00:00

Impact

Moderate

Bugzilla

CVE-2012-4929 SSL/TLS CRIME attack against HTTPS

Bugzilla ID

857 051

CVSS Status

verified

Base Score

4.30

Base Metrics

AV:N/AC:M/Au:N/C:P/I:N/A:N

Red Hat Security Errata

Platform Errata Release Date
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2013:0636 2013-03-13
RHEV-M for Servers (spice-client-msi) RHSA-2014:0416 2014-04-17
Red Hat Enterprise Linux 6 (openssl) RHSA-2013:0587 2013-03-04
Red Hat Enterprise Linux 5 (openssl) RHSA-2013:0587 2013-03-04

Affected Packages State

Platform Package State
Red Hat JBoss EWS 2 openssl Not affected
Red Hat JBoss EWS 1 openssl Not affected
Red Hat JBoss EAP 6 openssl Not affected
Red Hat Enterprise Linux 6 gnutls Will not fix
Red Hat Enterprise Linux 6 nss Not affected
Red Hat Enterprise Linux 6 openssl098e Will not fix
Red Hat Enterprise Linux 5 openssl097a Not affected
Red Hat Enterprise Linux 5 nss Not affected
Red Hat Enterprise Linux 5 gnutls Will not fix
Red Hat Enterprise Linux 4 nss Not affected
Red Hat Enterprise Linux 4 gnutls Will not fix
Red Hat Enterprise Linux 4 openssl Not affected
Red Hat Enterprise Linux 3 openssl Not affected