CVE-2024-23771

darkhttpd before 1.15 uses strcmp (which is not constant time) to verify authentication, which makes it easier for remote attackers to bypass authentication via a timing side channel.
Configurations

Configuration 1 (hide)

cpe:2.3:a:unix4lyfe:darkhttpd:*:*:*:*:*:*:*:*

History

26 Jan 2024, 19:24

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/01/25/1 - () http://www.openwall.com/lists/oss-security/2024/01/25/1 - Mailing List, Third Party Advisory
References () https://github.com/emikulic/darkhttpd/commit/f477619d49f3c4de9ad59bd194265a48ddc03f04 - () https://github.com/emikulic/darkhttpd/commit/f477619d49f3c4de9ad59bd194265a48ddc03f04 - Patch
References () https://github.com/emikulic/darkhttpd/compare/v1.14...v1.15 - () https://github.com/emikulic/darkhttpd/compare/v1.14...v1.15 - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Unix4lyfe
Unix4lyfe darkhttpd
CWE CWE-203
CPE cpe:2.3:a:unix4lyfe:darkhttpd:*:*:*:*:*:*:*:*

25 Jan 2024, 12:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/25/1 -

22 Jan 2024, 14:01

Type Values Removed Values Added
Summary
  • (es) darkhttpd anterior a 1.15 usa strcmp (que no es un tiempo constante) para verificar la autenticación, lo que facilita a atacantes remotos eludir la autenticación a través de un canal lateral de temporización.

22 Jan 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-22 04:15

Updated : 2024-01-26 19:24


NVD link : CVE-2024-23771

Mitre link : CVE-2024-23771

CVE.ORG link : CVE-2024-23771


JSON object : View

Products Affected

unix4lyfe

  • darkhttpd
CWE
CWE-203

Observable Discrepancy