The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
Project Subscriptions
| Vendors | Products |
|---|---|
|
F5
Subscribe
|
Arx
Subscribe
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Protocol Security Module
Subscribe
Big-ip Wan Optimization Manager
Subscribe
Big-ip Webaccelerator
Subscribe
Firepass
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T16:14:56.365Z
Reserved: 2013-05-21T00:00:00
Link: CVE-2013-3587
No data.
Status : Modified
Published: 2020-02-21T18:15:11.427
Modified: 2024-11-21T01:53:56.283
Link: CVE-2013-3587
OpenCVE Enrichment
No data.
Weaknesses