The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:50:47.639Z
Reserved: 2016-09-06T00:00:00
Link: CVE-2016-7153

No data.

Status : Modified
Published: 2016-09-06T10:59:01.493
Modified: 2024-11-21T02:57:36.217
Link: CVE-2016-7153
