CVE-2016-7153
Publication date 6 September 2016
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
firefox | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
oxide-qt | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
thunderbird | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
Notes
seth-arnold
NVD had this CVE assigned to multiple browers as of 2016-09-12. This CVE appears to cover a wide variety of browser side channels demonstrating the time difference between first byte and last byte in a response. This can be used both for compression-based determinations of exact strings from requests that are reflected in responses as well as uncompressed responses from sites that have disabled compression to mitigate BEAST or CRIME. The paper authors recommend users disable third-party cookies in their browsers, with the caveat that many services will break.
mdeslaur
We have no actionable item to fix this CVE. Since we release new firefox, thunderbird and chromium upstream releases, I'm marking this as ignored.
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
References
Other references
- http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/
- https://tom.vg/papers/heist_blackhat2016.pdf
- https://www.blackhat.com/docs/us-16/materials/us-16-VanGoethem-HEIST-HTTP-Encrypted-Information-Can-Be-Stolen-Through-TCP-Windows-wp.pdf
- https://www.cve.org/CVERecord?id=CVE-2016-7153