Unrated severityNVD Advisory· Published Sep 15, 2012· Updated Apr 29, 2026
CVE-2012-4929
CVE-2012-4929
Description
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
Affected products
19- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- osv-coords15 versionspkg:apk/chainguard/chromiumpkg:apk/chainguard/chromium-docker-selenium-compatpkg:apk/chainguard/chromium-langpkg:apk/chainguard/chromium-qtpkg:apk/chainguard/firefoxpkg:apk/wolfi/chromiumpkg:apk/wolfi/chromium-docker-selenium-compatpkg:apk/wolfi/chromium-langpkg:apk/wolfi/chromium-qtpkg:apk/wolfi/firefoxpkg:rpm/opensuse/links&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/lynx&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/w3m&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/wget&distro=openSUSE%20Tumbleweed
< 0+ 14 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 2.13-1.3
- (no CPE)range: < 2.8.8rel.2-4.13
- (no CPE)range: < 1.1.1l-1.2
- (no CPE)range: < 0.5.3.git20161120-1.1
- (no CPE)range: < 1.18-2.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
33- arstechnica.com/security/2012/09/crime-hijacks-https-sessions/nvd
- code.google.com/p/chromium/issues/detailnvd
- isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.htmlnvd
- jvn.jp/en/jp/JVN65273415/index.htmlnvd
- jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.htmlnvd
- lists.apple.com/archives/security-announce/2013/Jun/msg00000.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.htmlnvd
- lists.opensuse.org/opensuse-updates/2012-10/msg00096.htmlnvd
- lists.opensuse.org/opensuse-updates/2013-01/msg00034.htmlnvd
- lists.opensuse.org/opensuse-updates/2013-01/msg00048.htmlnvd
- marc.infonvd
- news.ycombinator.com/itemnvd
- rhn.redhat.com/errata/RHSA-2013-0587.htmlnvd
- security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successornvd
- support.apple.com/kb/HT5784nvd
- threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312nvd
- threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512nvd
- www.debian.org/security/2012/dsa-2579nvd
- www.debian.org/security/2013/dsa-2627nvd
- www.debian.org/security/2015/dsa-3253nvd
- www.ekoparty.org/2012/thai-duong.phpnvd
- www.iacr.org/cryptodb/data/paper.phpnvd
- www.securityfocus.com/bid/55704nvd
- www.theregister.co.uk/2012/09/14/crime_tls_attack/nvd
- www.ubuntu.com/usn/USN-1627-1nvd
- www.ubuntu.com/usn/USN-1628-1nvd
- www.ubuntu.com/usn/USN-1898-1nvd
- bugzilla.redhat.com/show_bug.cginvd
- chromiumcodereview.appspot.com/10825183nvd
- community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltlsnvd
- gist.github.com/3696912nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920nvd
- threatpost.com/en_us/blogs/demo-crime-tls-attack-091212nvd
News mentions
0No linked articles in our index yet.