CVE-2016-7152
Summary
| CVE | CVE-2016-7152 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-09-06 10:59:00 UTC |
| Updated | 2017-02-19 06:22:00 UTC |
| Description | The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apple | Safari | All | All | All | All |
| Application | Apple | Safari | All | All | All | All |
| Application | Chrome | - | All | All | All | |
| Application | Chrome | - | All | All | All | |
| Application | Microsoft | Edge | - | All | All | All |
| Application | Microsoft | Edge | - | All | All | All |
| Application | Microsoft | Internet Explorer | - | All | All | All |
| Application | Microsoft | Internet Explorer | - | All | All | All |
| Application | Mozilla | Firefox | All | All | All | All |
| Application | Mozilla | Firefox | All | All | All | All |
| Application | Opera | Opera | - | All | All | All |
| Application | Opera | Opera | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Microsoft Internet Explorer HTTPS API Attack Against TCP Congestion Window Protocol Lets Remote Users Obtain Potentially Sensitive Information on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | |
| HTTPS CVE-2016-7152 Information Disclosure Vulnerability | BID | www.securityfocus.com | |
| New attack steals SSNs, e-mail addresses, and more from HTTPS pages | Ars Technica | MISC | arstechnica.com | Technical Description |
| Apple Safari HTTPS API Attack Against TCP Congestion Window Protocol Lets Remote Users Obtain Potentially Sensitive Information on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | |
| tom.vg/papers/heist_blackhat2016.pdf | MISC | tom.vg | Technical Description |
| Mozilla Firefox HTTPS API Attack Against TCP Congestion Window Protocol Lets Remote Users Obtain Potentially Sensitive Information on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Opera HTTPS API Attack Against TCP Congestion Window Protocol Lets Remote Users Obtain Potentially Sensitive Information on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Google Chrome HTTPS API Attack Against TCP Congestion Window Protocol Lets Remote Users Obtain Potentially Sensitive Information from the Target System in Certain Cases - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Microsoft Edge HTTPS API Attack Against TCP Congestion Window Protocol Lets Remote Users Obtain Potentially Sensitive Information on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.