Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3618

Опубликовано: 23 мар. 2022
Источник: debian
EPSS Низкий

Описание

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nginxfixed1.20.2-2package
nginxfixed1.18.0-6.1+deb11u2bullseyepackage
nginxno-dsastretchpackage
vsftpdfixed3.0.5-0.1package
vsftpdno-dsabookwormpackage
vsftpdno-dsabullseyepackage
vsftpdno-dsabusterpackage
vsftpdno-dsastretchpackage
sendmailfixed8.16.1-1experimentalpackage
sendmailfixed8.16.1-2package
sendmailno-dsabullseyepackage
sendmailno-dsabusterpackage
sendmailno-dsastretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1975623

  • https://alpaca-attack.com/

  • Generic TLS protocol issue, some applications have released mitigations:

  • nginx: http://hg.nginx.org/nginx/rev/ec1071830799

  • vsftpd: https://security.appspot.com/vsftpd/Changelog.txt (3.0.4)

  • * Close the control connection after 10 unknown commands pre-login.

  • * Reject any TLS ALPN advertisement that's not 'ftp'.

  • * Add ssl_sni_hostname option to require a match on incoming SNI hostname.

  • sendmail: Fixed in 3.16.1: https://marc.info/?l=sendmail-announce&m=159394546814125&w=2

  • exim4 has config option: https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html

EPSS

Процентиль: 63%
0.0045
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 3 лет назад

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS3: 7.4
redhat
около 4 лет назад

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS3: 7.4
nvd
около 3 лет назад

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS3: 7.4
msrc
около 3 лет назад

Описание отсутствует

suse-cvrf
больше 2 лет назад

Security update for nginx

EPSS

Процентиль: 63%
0.0045
Низкий