Description
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3203-1 | nginx security update |
EUVD |
EUVD-2021-26922 | ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. |
Ubuntu USN |
USN-5371-1 | nginx vulnerabilities |
Ubuntu USN |
USN-5371-2 | nginx vulnerability |
Ubuntu USN |
USN-6379-1 | vsftpd vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:07.459Z
Reserved: 2021-06-24T00:00:00.000Z
Link: CVE-2021-3618
No data.
Status : Modified
Published: 2022-03-23T20:15:09.833
Modified: 2024-11-21T06:21:59.713
Link: CVE-2021-3618
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN