Published:2016/07/22  Last Updated:2016/07/26

JVN#65273415
Android OS issue where it is affected by the CRIME attack

Overview

The implementation of the TLS protocol in Android OS contains a vulnerability where plaintext HTTP headers may be obtained.

Products Affected

  • Android OS versions 4.1.2 and earlier

Description

The TLS protocol contains a function that compresses data for communications between the client and server. This function does not properly obfuscate the length of the unencrypted data. When this function is enabled on both the client and server, it results in a vulnerability where plaintext HTTP headers may be obtained. The TLS implementation in Android OS is affected by this vulnerability.
Exploiting this vulnerability to obtain plaintext HTTP headers is referred to as the CRIME attack.

Impact

A man-in-the-middle attacker performing the CRIME attack may obtain plaintext HTTP headers.

Solution

Apply an update
Apply the update according to the information provided by the provider or developer.

Vendor Status

Vendor Status Last Update Vendor Notes
Cybozu, Inc. Not Vulnerable 2016/07/22
Disney Mobile on SoftBank Vulnerable, investigating 2016/07/22
FUJITSU LIMITED Not Vulnerable 2016/07/22
KDDI CORPORATION Vulnerable, investigating 2016/07/26
Sharp Corporation Not Vulnerable 2016/07/22
SoftBank Vulnerable, investigating 2016/07/22
Y!mobile Vulnerable, investigating 2016/07/22

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score: 3.7
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:H/Au:N/C:P/I:N/A:N
Base Score: 2.6
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2012-4929
JVN iPedia JVNDB-2016-000129

Update History

2016/07/22
KDDI CORPORATION update status
2016/07/25
KDDI CORPORATION update status
2016/07/26
KDDI CORPORATION update status