CVE-2014-3166

The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.
References
Link Resource
http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html
http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
http://secunia.com/advisories/59693
http://secunia.com/advisories/59904
http://secunia.com/advisories/60685
http://secunia.com/advisories/60798
http://security.gentoo.org/glsa/glsa-201408-16.xml
http://www.debian.org/security/2014/dsa-3039
http://www.ietf.org/mail-archive/web/tls/current/msg13345.html
http://www.securityfocus.com/bid/69202
http://www.securitytracker.com/id/1030732
https://code.google.com/p/chromium/issues/detail?id=398925
https://src.chromium.org/viewvc/chrome?revision=286598&view=revision
https://src.chromium.org/viewvc/chrome?revision=288435&view=revision
http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html
http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html
http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
http://secunia.com/advisories/59693
http://secunia.com/advisories/59904
http://secunia.com/advisories/60685
http://secunia.com/advisories/60798
http://security.gentoo.org/glsa/glsa-201408-16.xml
http://www.debian.org/security/2014/dsa-3039
http://www.ietf.org/mail-archive/web/tls/current/msg13345.html
http://www.securityfocus.com/bid/69202
http://www.securitytracker.com/id/1030732
https://code.google.com/p/chromium/issues/detail?id=398925
https://src.chromium.org/viewvc/chrome?revision=286598&view=revision
https://src.chromium.org/viewvc/chrome?revision=288435&view=revision
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-08-13 04:57

Updated : 2025-04-12 10:46


NVD link : CVE-2014-3166

Mitre link : CVE-2014-3166

CVE.ORG link : CVE-2014-3166


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux

google

  • android
  • chrome

microsoft

  • windows

apple

  • mac_os_x
  • iphone_os