CVE-2021-3618
Public on 2022-03-23
Modified on 2024-05-03
Description
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 2 - Nginx1 Extra | nginx | 2023-09-25 | ALAS2NGINX1-2023-002 | Fixed |
Amazon Linux 2023 | nginx | 2023-03-22 | ALAS2023-2023-099 | Fixed |
Amazon Linux 2 - Core | sendmail | Pending Fix | ||
Amazon Linux 2023 | sendmail | 2023-03-22 | ALAS2023-2023-018 | Fixed |
Amazon Linux 2 - Core | vsftpd | 2024-01-22 | ALAS2-2024-2431 | Fixed |
Amazon Linux 2023 | vsftpd | 2023-03-22 | ALAS2023-2023-019 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.4 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
NVD | CVSSv2 | 5.8 | AV:N/AC:M/Au:N/C:P/I:P/A:N |
NVD | CVSSv3 | 7.4 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |