CVE-2014-3166

The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*

History

07 Nov 2023, 02:19

Type Values Removed Values Added
References (BID) http://www.securityfocus.com/bid/69202 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/69202 -
References (SECUNIA) http://secunia.com/advisories/59904 - Broken Link, Third Party Advisory () http://secunia.com/advisories/59904 -
References (DEBIAN) http://www.debian.org/security/2014/dsa-3039 - Third Party Advisory () http://www.debian.org/security/2014/dsa-3039 -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Exploit, Issue Tracking, Mailing List, Vendor Advisory () https://code.google.com/p/chromium/issues/detail?id=398925 -
References (SECTRACK) http://www.securitytracker.com/id/1030732 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1030732 -
References (CONFIRM) https://src.chromium.org/viewvc/chrome?revision=286598&view=revision - Third Party Advisory () https://src.chromium.org/viewvc/chrome?revision=286598&view=revision -
References (GENTOO) http://security.gentoo.org/glsa/glsa-201408-16.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201408-16.xml -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html -
References (SECUNIA) http://secunia.com/advisories/60798 - Broken Link, Third Party Advisory () http://secunia.com/advisories/60798 -
References (CONFIRM) https://src.chromium.org/viewvc/chrome?revision=288435&view=revision - Third Party Advisory () https://src.chromium.org/viewvc/chrome?revision=288435&view=revision -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html -
References (SECUNIA) http://secunia.com/advisories/60685 - Broken Link, Third Party Advisory () http://secunia.com/advisories/60685 -
References (SECUNIA) http://secunia.com/advisories/59693 - Broken Link, Third Party Advisory () http://secunia.com/advisories/59693 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Release Notes, Vendor Advisory () http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html -
References (MLIST) http://www.ietf.org/mail-archive/web/tls/current/msg13345.html - Third Party Advisory () http://www.ietf.org/mail-archive/web/tls/current/msg13345.html -

10 Nov 2022, 17:55

Type Values Removed Values Added
First Time Apple iphone Os
CWE CWE-200 NVD-CWE-noinfo
CVSS v2 : 5.0
v3 : unknown
v2 : 4.3
v3 : unknown
References (SECUNIA) http://secunia.com/advisories/59904 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/59904 - Broken Link, Third Party Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - Release Notes, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/60685 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/60685 - Broken Link, Third Party Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - Release Notes, Vendor Advisory
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Vendor Advisory (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=398925 - Exploit, Issue Tracking, Mailing List, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/59693 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/59693 - Broken Link, Third Party Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - Release Notes, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/69202 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/69202 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id/1030732 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1030732 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/60798 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/60798 - Broken Link, Third Party Advisory
CPE cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Information

Published : 2014-08-13 04:57

Updated : 2023-12-10 11:31


NVD link : CVE-2014-3166

Mitre link : CVE-2014-3166

CVE.ORG link : CVE-2014-3166


JSON object : View

Products Affected

linux

  • linux_kernel

google

  • chrome
  • android

apple

  • mac_os_x
  • iphone_os

microsoft

  • windows

debian

  • debian_linux