ALAS2022-2022-136

Related Vulnerabilities: CVE-2021-3618  

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. (CVE-2021-3618)

ALAS2022-2022-136


Amazon Linux 2022 Security Advisory: ALAS-2022-136
Advisory Release Date: 2022-09-13 19:05 Pacific
Advisory Updated Date: 2022-09-21 20:02 Pacific
Severity: Medium
References: CVE-2021-3618 

Issue Overview:

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. (CVE-2021-3618)


Affected Packages:

vsftpd


Issue Correction:
Run dnf update vsftpd --releasever=2022.0.20220921 to update your system.

New Packages:
aarch64:
    vsftpd-debuginfo-3.0.5-1.amzn2022.aarch64
    vsftpd-debugsource-3.0.5-1.amzn2022.aarch64
    vsftpd-3.0.5-1.amzn2022.aarch64

i686:
    vsftpd-debuginfo-3.0.5-1.amzn2022.i686
    vsftpd-debugsource-3.0.5-1.amzn2022.i686
    vsftpd-3.0.5-1.amzn2022.i686

src:
    vsftpd-3.0.5-1.amzn2022.src

x86_64:
    vsftpd-debuginfo-3.0.5-1.amzn2022.x86_64
    vsftpd-debugsource-3.0.5-1.amzn2022.x86_64
    vsftpd-3.0.5-1.amzn2022.x86_64