Vulnerabilities > CVE-2012-4930 - Cryptographic Issues vulnerability in multiple products

047910
CVSS 2.6 - LOW
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
high complexity
google
mozilla
CWE-310
nessus

Summary

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Vulnerable Configurations

Part Description Count
Application
Google
1
Application
Mozilla
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyWindows
    NASL idSEAMONKEY_212.NASL
    descriptionThe installed version of SeaMonkey is earlier than 2.12.0. Such versions are potentially affected by the following security issues : - An error exists related to
    last seen2020-06-01
    modified2020-06-02
    plugin id61718
    published2012-08-29
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61718
    titleSeaMonkey < 2.12.0 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(61718);
      script_version("1.19");
      script_cvs_date("Date: 2019/12/04");
    
      script_cve_id(
        "CVE-2012-1956",
        "CVE-2012-1970",
        "CVE-2012-1971",
        "CVE-2012-1972",
        "CVE-2012-1973",
        "CVE-2012-1974",
        "CVE-2012-1975",
        "CVE-2012-1976",
        "CVE-2012-3956",
        "CVE-2012-3957",
        "CVE-2012-3958",
        "CVE-2012-3959",
        "CVE-2012-3960",
        "CVE-2012-3961",
        "CVE-2012-3962",
        "CVE-2012-3963",
        "CVE-2012-3964",
        "CVE-2012-3966",
        "CVE-2012-3968",
        "CVE-2012-3969",
        "CVE-2012-3970",
        "CVE-2012-3971",
        "CVE-2012-3972",
        "CVE-2012-3975",
        "CVE-2012-3976",
        "CVE-2012-3978",
        "CVE-2012-4930"
      );
      script_bugtraq_id(
        55249,
        55260,
        55264,
        55266,
        55274,
        55276,
        55278,
        55292,
        55304,
        55306,
        55310,
        55311,
        55313,
        55314,
        55316,
        55317,
        55318,
        55319,
        55320,
        55321,
        55322,
        55323,
        55324,
        55325,
        55340,
        55341,
        55342,
        55707
      );
    
      script_name(english:"SeaMonkey < 2.12.0 Multiple Vulnerabilities");
      script_summary(english:"Checks version of SeaMonkey");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host contains a web browser that is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The installed version of SeaMonkey is earlier than 2.12.0. Such
    versions are potentially affected by the following security issues :
    
      - An error exists related to 'Object.defineProperty'
        and the location object that could allow cross-site
        scripting attacks. (CVE-2012-1956)
    
      - Unspecified memory safety issues exist. (CVE-2012-1970,
        CVE-2012-1971)
    
      - Multiple use-after-free errors exist. (CVE-2012-1972,
        CVE-2012-1973, CVE-2012-1974, CVE-2012-1975,
        CVE-2012-1976, CVE-2012-3956, CVE-2012-3957,
        CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
        CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,
        CVE-2012-3964)
    
      - An error exists related to bitmap (BMP) and icon (ICO)
        file decoding that can lead to memory corruption,
        causing application crashes and potentially arbitrary
        code execution. (CVE-2012-3966)
    
      - A use-after-free error exists related to WebGL shaders.
        (CVE-2012-3968)
    
      - A buffer overflow exists related to SVG filters.
        (CVE-2012-3969)
    
      - A use-after-free error exists related to elements
        having 'requiredFeatures' attributes. (CVE-2012-3970)
    
      - A 'Graphite 2' library memory corruption error exists.
        (CVE-2012-3971)
    
      - An XSLT out-of-bounds read error exists related to
        'format-number'. (CVE-2012-3972)
    
      - The DOM parser can unintentionally load linked
        resources in extensions. (CVE-2012-3975)
    
      - Incorrect SSL certificate information can be displayed
        in the address bar when two 'onLocationChange' events
        fire out of order. (CVE-2012-3976)
    
      - Security checks related to location objects can be
        bypassed if crafted calls are made to the browser
        chrome code. (CVE-2012-3978)
    
      - SPDY's request header compression leads to information
        leakage, which can allow private data such as session
        cookies to be extracted, even over an SSL connection.
        (CVE-2012-4930)");
      script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/archive/1/524145/30/0/threaded");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-57/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-58/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-59/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-61/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-62/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-63/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-64/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-65/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-68/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-69/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-70/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-73/");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to SeaMonkey 2.12.0 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-3971");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/28");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/29");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:seamonkey");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("mozilla_org_installed.nasl");
      script_require_keys("SeaMonkey/Version");
    
      exit(0);
    }
    
    include("mozilla_version.inc");
    port = get_kb_item("SMB/transport");
    if (!port) port = 445;
    
    installs = get_kb_list("SMB/SeaMonkey/*");
    if (isnull(installs)) audit(AUDIT_NOT_INST, "SeaMonkey");
    
    mozilla_check_version(installs:installs, product:'seamonkey', fix:'2.12.0', severity:SECURITY_HOLE, xss:TRUE);
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_FIREFOX_15_0.NASL
    descriptionThe installed version of Firefox is earlier than 15.0 and thus, is potentially affected by the following security issues : - An error exists related to
    last seen2020-06-01
    modified2020-06-02
    plugin id61711
    published2012-08-29
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61711
    titleFirefox < 15.0 Multiple Vulnerabilities (Mac OS X)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(61711);
      script_version("1.20");
      script_cvs_date("Date: 2019/12/04");
    
      script_cve_id(
        "CVE-2012-1956",
        "CVE-2012-1970",
        "CVE-2012-1971",
        "CVE-2012-1972",
        "CVE-2012-1973",
        "CVE-2012-1974",
        "CVE-2012-1975",
        "CVE-2012-1976",
        "CVE-2012-3956",
        "CVE-2012-3957",
        "CVE-2012-3958",
        "CVE-2012-3959",
        "CVE-2012-3960",
        "CVE-2012-3961",
        "CVE-2012-3962",
        "CVE-2012-3963",
        "CVE-2012-3964",
        "CVE-2012-3965",
        "CVE-2012-3966",
        "CVE-2012-3968",
        "CVE-2012-3969",
        "CVE-2012-3970",
        "CVE-2012-3971",
        "CVE-2012-3972",
        "CVE-2012-3973",
        "CVE-2012-3975",
        "CVE-2012-3976",
        "CVE-2012-3978",
        "CVE-2012-3980",
        "CVE-2012-4930"
      );
      script_bugtraq_id(
        55249,
        55256,
        55257,
        55260,
        55264,
        55266,
        55274,
        55276,
        55278,
        55292,
        55304,
        55306,
        55308,
        55310,
        55311,
        55313,
        55314,
        55316,
        55317,
        55318,
        55319,
        55320,
        55321,
        55322,
        55323,
        55324,
        55325,
        55340,
        55341,
        55342,
        55857
      );
    
      script_name(english:"Firefox < 15.0 Multiple Vulnerabilities (Mac OS X)");
      script_summary(english:"Checks version of Firefox");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Mac OS X host contains a web browser that is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The installed version of Firefox is earlier than 15.0 and thus, is
    potentially affected by the following security issues :
    
      - An error exists related to 'Object.defineProperty'
        and the location object that could allow cross-site
        scripting attacks. (CVE-2012-1956)
    
      - Unspecified memory safety issues exist. (CVE-2012-1970,
        CVE-2012-1971)
    
      - Multiple use-after-free errors exist. (CVE-2012-1972,
        CVE-2012-1973, CVE-2012-1974, CVE-2012-1975,
        CVE-2012-1976, CVE-2012-3956, CVE-2012-3957,
        CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
        CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,
        CVE-2012-3964)
    
      - An error exists related to 'about:newtab' and the
        browser's history. This error can allow a newly opened
        tab to further open a new window and navigate to the
        privileged 'about:newtab' page leading to possible
        privilege escalation. (CVE-2012-3965)
    
      - An error exists related to bitmap (BMP) and icon (ICO)
        file decoding that can lead to memory corruption
        causing application crashes and potentially arbitrary
        code execution. (CVE-2012-3966)
    
      - A use-after-free error exists related to WebGL shaders.
        (CVE-2012-3968)
    
      - A buffer overflow exists related to SVG filters.
        (CVE-2012-3969)
    
      - A use-after-free error exists related to elements
        having 'requiredFeatures' attributes. (CVE-2012-3970)
    
      - A 'Graphite 2' library memory corruption error exists.
        (CVE-2012-3971)
    
      - An XSLT out-of-bounds read error exists related to
        'format-number'. (CVE-2012-3972)
    
      - Remote debugging is possible even when disabled and the
        'HTTPMonitor' extension is enabled. (CVE-2012-3973)
    
      - The DOM parser can unintentionally load linked
        resources in extensions. (CVE-2012-3975)
    
      - Incorrect SSL certificate information can be displayed
        in the address bar when two 'onLocationChange' events
        fire out of order. (CVE-2012-3976)
    
      - Security checks related to location objects can be
        bypassed if crafted calls are made to the browser
        chrome code. (CVE-2012-3978)
    
      - Calling 'eval' in the web console can allow injected
        code to be executed with browser chrome privileges.
        (CVE-2012-3980)
    
      - SPDY's request header compression leads to information
        leakage, which can allow private data such as session
        cookies to be extracted, even over an SSL connection.
        (CVE-2012-4930)");
      script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/archive/1/524145/30/0/threaded");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-57/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-58/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-59/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-60/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-61/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-62/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-63/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-64/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-65/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-66/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-68/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-69/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-70/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-72/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-73/");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Firefox 15.0 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-3971");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/28");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/29");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_firefox_installed.nasl");
      script_require_keys("MacOSX/Firefox/Installed");
    
      exit(0);
    }
    
    include("mozilla_version.inc");
    kb_base = "MacOSX/Firefox";
    get_kb_item_or_exit(kb_base+"/Installed");
    
    version = get_kb_item_or_exit(kb_base+"/Version", exit_code:1);
    path = get_kb_item_or_exit(kb_base+"/Path", exit_code:1);
    
    if (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Firefox installation is in the ESR branch.');
    
    mozilla_check_version(product:'firefox', version:version, path:path, esr:FALSE, fix:'15.0', skippat:'^10\\.0\\.', severity:SECURITY_HOLE, xss:TRUE);
    
  • NASL familyWindows
    NASL idMOZILLA_FIREFOX_150.NASL
    descriptionThe installed version of Firefox is earlier than 15.0 and thus, is potentially affected by the following security issues : - An error exists related to
    last seen2020-06-01
    modified2020-06-02
    plugin id61715
    published2012-08-29
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61715
    titleFirefox < 15.0 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(61715);
      script_version("1.20");
      script_cvs_date("Date: 2019/12/04");
    
      script_cve_id(
        "CVE-2012-1956",
        "CVE-2012-1970",
        "CVE-2012-1971",
        "CVE-2012-1972",
        "CVE-2012-1973",
        "CVE-2012-1974",
        "CVE-2012-1975",
        "CVE-2012-1976",
        "CVE-2012-3956",
        "CVE-2012-3957",
        "CVE-2012-3958",
        "CVE-2012-3959",
        "CVE-2012-3960",
        "CVE-2012-3961",
        "CVE-2012-3962",
        "CVE-2012-3963",
        "CVE-2012-3964",
        "CVE-2012-3965",
        "CVE-2012-3966",
        "CVE-2012-3968",
        "CVE-2012-3969",
        "CVE-2012-3970",
        "CVE-2012-3971",
        "CVE-2012-3972",
        "CVE-2012-3973",
        "CVE-2012-3974",
        "CVE-2012-3975",
        "CVE-2012-3976",
        "CVE-2012-3978",
        "CVE-2012-3980",
        "CVE-2012-4930"
      );
      script_bugtraq_id(
        55249,
        55256,
        55257,
        55260,
        55264,
        55266,
        55274,
        55276,
        55278,
        55292,
        55304,
        55306,
        55308,
        55310,
        55311,
        55312,
        55313,
        55314,
        55316,
        55317,
        55318,
        55319,
        55320,
        55321,
        55322,
        55323,
        55324,
        55325,
        55340,
        55341,
        55342
      );
    
      script_name(english:"Firefox < 15.0 Multiple Vulnerabilities");
      script_summary(english:"Checks version of Firefox");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host contains a web browser that is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The installed version of Firefox is earlier than 15.0 and thus, is
    potentially affected by the following security issues :
    
      - An error exists related to 'Object.defineProperty'
        and the location object and  can allow cross-site
        scripting attacks. (CVE-2012-1956)
    
      - Unspecified memory safety issues exist. (CVE-2012-1970,
        CVE-2012-1971)
    
      - Multiple use-after-free errors exist. (CVE-2012-1972,
        CVE-2012-1973, CVE-2012-1974, CVE-2012-1975,
        CVE-2012-1976, CVE-2012-3956, CVE-2012-3957,
        CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,
        CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,
        CVE-2012-3964)
    
      - An error exists related to 'about:newtab' and the
        browser's history. This error can allow a newly opened
        tab to further open a new window and navigate to the
        privileged 'about:newtab' page leading to possible
        privilege escalation. (CVE-2012-3965)
    
      - An error exists related to bitmap (BMP) and icon (ICO)
        file decoding that can lead to memory corruption
        causing application crashes and potentially arbitrary
        code execution. (CVE-2012-3966)
    
      - A use-after-free error exists related to WebGL shaders.
        (CVE-2012-3968)
    
      - A buffer overflow exists related to SVG filters.
        (CVE-2012-3969)
    
      - A use-after-free error exists related to elements
        having 'requiredFeatures' attributes. (CVE-2012-3970)
    
      - A 'Graphite 2' library memory corruption error exists.
        (CVE-2012-3971)
    
      - An XSLT out-of-bounds read error exists related to
        'format-number'. (CVE-2012-3972)
    
      - Remote debugging is possible even when disabled and the
        'HTTPMonitor' extension is enabled. (CVE-2012-3973)
    
      - The installer can be ticked into running unauthorized
        executables. (CVE-2012-3974)
    
      - The DOM parser can unintentionally load linked
        resources in extensions. (CVE-2012-3975)
    
      - Incorrect SSL certificate information can be displayed
        in the address bar when two 'onLocationChange' events
        fire out of order. (CVE-2012-3976)
    
      - Security checks related to location objects can be
        bypassed if crafted calls are made to the browser
        chrome code. (CVE-2012-3978)
    
      - Calling 'eval' in the web console can allow injected
        code to be executed with browser chrome privileges.
        (CVE-2012-3980)
    
      - SPDY's request header compression leads to information
        leakage, which can allow private data such as session
        cookies to be extracted, even over an SSL connection.
        (CVE-2012-4930)");
      script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/archive/1/524145/30/0/threaded");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-57/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-58/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-59/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-60/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-61/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-62/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-63/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-64/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-65/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-66/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-67/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-68/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-69/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-70/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-72/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-73/");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Firefox 15.0 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-3971");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/28");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/29");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("mozilla_org_installed.nasl");
      script_require_keys("Mozilla/Firefox/Version");
    
      exit(0);
    }
    
    include("mozilla_version.inc");
    port = get_kb_item_or_exit("SMB/transport");
    
    installs = get_kb_list("SMB/Mozilla/Firefox/*");
    if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");
    
    mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'15.0', severity:SECURITY_HOLE, xss:TRUE);
    
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL14059.NASL
    descriptionThe SPDY protocol 3, and earlier, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data. This allows man-in-the-middle attackers to obtain plain text HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header. The SPDY protocol 3, and earlier, is used in Mozilla Firefox, Google Chrome, and other products. (CVE-2012-4930) Impact Connections to virtual servers configured with the SPDY profile may be at risk.
    last seen2020-06-01
    modified2020-06-02
    plugin id88431
    published2016-01-28
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88431
    titleF5 Networks BIG-IP : CRIME vulnerability via the SPDY protocol (K14059)
  • NASL familyGeneral
    NASL idSSL_CRIME.NASL
    descriptionThe remote service has one of two configurations that are known to be required for the CRIME attack : - SSL / TLS compression is enabled. - TLS advertises the SPDY protocol earlier than version 4. Note that Nessus did not attempt to launch the CRIME attack against the remote service.
    last seen2020-06-01
    modified2020-06-02
    plugin id62565
    published2012-10-16
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62565
    titleTransport Layer Security (TLS) Protocol CRIME Vulnerability
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_FIREFOX-201210-121015.NASL
    descriptionMozilla Firefox was updated to the 10.0.9ESR security release which fixes bugs and security issues : - Security researchers Thai Duong and Juliano Rizzo reported that SPDY
    last seen2020-06-05
    modified2013-01-25
    plugin id64133
    published2013-01-25
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64133
    titleSuSE 11.2 Security Update : Mozilla Firefox (SAT Patch Number 6951)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201301-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201301-01 (Mozilla Products: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL&rsquo;s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser&rsquo;s font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id63402
    published2013-01-08
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63402
    titleGLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_FIREFOX-201210-8327.NASL
    descriptionMozillaFirefox was updated to the 10.0.9ESR security release which fixes bugs and security issues : - Security researchers Thai Duong and Juliano Rizzo reported that SPDY
    last seen2020-06-05
    modified2012-10-17
    plugin id62573
    published2012-10-17
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62573
    titleSuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 8327)

Seebug

bulletinFamilyexploit
descriptionCVE ID:CVE-2012-4930 SPDY是Google开发的基于传输控制协议(TCP)的应用层协议。 Mozilla Firefox, Google Chrome及其他多个产品使用的SPDY协议3,执行压缩数据加密时没有正确模糊未加密数据的长度,可通过中间人攻击的攻击者可通过提交一系列猜测请求,观察到压缩数据长度的变化(也称CRIME攻击)来获得明文HTTP头信息,造成敏感信息泄露(如cookie信息)。 0 SPDY protocol 3及之前版本 厂商解决方案 用户可参考如下供应商获得最新版本的产品: http://www.google.com/chrome http://www.mozilla.org http://www.opera.com http://www.apple.com
idSSV:60390
last seen2017-11-19
modified2012-09-18
published2012-09-18
reporterRoot
titleSPDY protocol &lt;=3 协议信息泄露漏洞