Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-3618

Опубликовано: 23 мар. 2022
Источник: nvd
CVSS3: 7.4
CVSS2: 5.8
EPSS Низкий

Описание

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
Версия до 1.21.0 (исключая)
Конфигурация 2
cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*
Версия до 8.17 (исключая)
Конфигурация 3
cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:*
Версия до 3.0.4 (исключая)
Конфигурация 4

Одно из

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
Конфигурация 5
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

EPSS

Процентиль: 63%
0.0045
Низкий

7.4 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-295
CWE-295

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 3 лет назад

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS3: 7.4
redhat
около 4 лет назад

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS3: 7.4
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.4
debian
около 3 лет назад

ALPACA is an application layer protocol content confusion attack, expl ...

suse-cvrf
больше 2 лет назад

Security update for nginx

EPSS

Процентиль: 63%
0.0045
Низкий

7.4 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-295
CWE-295