A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
2022-03-02T23:15:09.013
2024-11-21T06:22:14.133
Modified
CVSSv3.1: 3.1 (LOW)
AV:N/AC:M/Au:S/C:N/I:N/A:P
6.8
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | nbdkit_project | nbdkit | < 1.24.6 | Yes |
Application | nbdkit_project | nbdkit | < 1.26.5 | Yes |
Application | nbdkit_project | nbdkit | < 1.27.6 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |