The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1036741 | vdb entry |
http://www.securitytracker.com/id/1036742 | vdb entry |
http://www.securityfocus.com/bid/92769 | vdb entry |
https://tom.vg/papers/heist_blackhat2016.pdf | technical description |
http://www.securitytracker.com/id/1036745 | vdb entry |
http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/ | technical description |
http://www.securitytracker.com/id/1036744 | vdb entry |
http://www.securitytracker.com/id/1036743 | vdb entry |
http://www.securitytracker.com/id/1036746 | vdb entry |