CVE-2021-3618
23.03.2022, 20:15
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.Enginsight
Vendor | Product | Version |
---|---|---|
f5 | nginx | 𝑥 < 1.21.0 |
sendmail | sendmail | 𝑥 < 8.17 |
vsftpd_project | vsftpd | 𝑥 < 3.0.4 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
nginx |
| ||||||||||||||
sendmail |
| ||||||||||||||
vsftpd |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
nginx |
| ||||||||||||||||||||||
sendmail |
| ||||||||||||||||||||||
vsftpd |
|
Common Weakness Enumeration