darkhttpd before 1.15 uses strcmp (which is not constant time) to verify authentication, which makes it easier for remote attackers to bypass authentication via a timing side channel.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/01/25/1 | Mailing List Third Party Advisory |
https://github.com/emikulic/darkhttpd/commit/f477619d49f3c4de9ad59bd194265a48ddc03f04 | Patch |
https://github.com/emikulic/darkhttpd/compare/v1.14...v1.15 | Product |
Configurations
History
No history.
Information
Published : 2024-01-22 04:15
Updated : 2024-01-26 19:24
NVD link : CVE-2024-23771
Mitre link : CVE-2024-23771
CVE.ORG link : CVE-2024-23771
JSON object : View
Products Affected
unix4lyfe
- darkhttpd
CWE
CWE-203
Observable Discrepancy