Transport Layer Security (TLS) Protocol CRIME Vulnerability

low Nessus Plugin ID 62565

Synopsis

The remote service has a configuration that may make it vulnerable to the CRIME attack.

Description

The remote service has one of two configurations that are known to be required for the CRIME attack :

- SSL / TLS compression is enabled.

- TLS advertises the SPDY protocol earlier than version 4.

Note that Nessus did not attempt to launch the CRIME attack against the remote service.

Solution

Disable compression and / or the SPDY service.

See Also

https://www.iacr.org/cryptodb/data/paper.php?pubkey=3091

http://www.nessus.org/u?c44d5826

https://bz.apache.org/bugzilla/show_bug.cgi?id=53219

Plugin Details

Severity: Low

ID: 62565

File Name: ssl_crime.nasl

Version: 1.15

Type: remote

Family: General

Published: 10/16/2012

Updated: 1/6/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2012-4930

Vulnerability Information

Required KB Items: Settings/ParanoidReport, SSL/Supported

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 9/15/2012

Reference Information

CVE: CVE-2012-4929, CVE-2012-4930

BID: 55704, 55707