Bug 1388003 (CVE-2016-7152)

Summary: CVE-2016-7152 HTTPS: HEIST attack allows attackers to sniff TLS encrypted HTTP traffic
Product: [Other] Security Response Reporter: Dhiru Kholia <dkholia>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: luhliari, webstack-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-24 08:01:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1364927    

Description Dhiru Kholia 2016-10-24 07:54:41 UTC
HEIST enables an attacker to conduct BREACH attack against HTTP compression and CRIME attack against TLS compression without being in a man-in-the-middle position. HEIST uses a side-channel attack involving TCP-windows to leak the exact size of any cross-origin response, without having to observe traffic at the network level. Thus, HEIST enables compression-based attacks such as CRIME and BREACH to be performed purely in the browser, by any malicious website or script, without requiring a man-in-the-middle position.

HEIST stands for "HTTP Encrypted Information can be Stolen through TCP-windows".

External References:

https://www.blackhat.com/docs/us-16/materials/us-16-VanGoethem-HEIST-HTTP-Encrypted-Information-Can-Be-Stolen-Through-TCP-Windows-wp.pdf

Comment 1 Dhiru Kholia 2016-10-24 07:56:15 UTC
Mitigation:

Disable third-party cookies in the browser.

https://support.mozilla.org/en-US/kb/disable-third-party-cookies (Firefox)
https://support.google.com/chrome/answer/95647?hl=en (Google Chrome)