The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:50:47.560Z
Reserved: 2016-09-06T00:00:00
Link: CVE-2016-7152

No data.

Status : Modified
Published: 2016-09-06T10:59:00.133
Modified: 2024-11-21T02:57:36.070
Link: CVE-2016-7152
