CVE-2024-39920

The TCP protocol in RFC 9293 has a timing side channel that makes it easier for remote attackers to infer the content of one TCP connection from a client system (to any server), when that client system is concurrently obtaining TCP data at a slow rate from an attacker-controlled server, aka the "SnailLoad" issue. For example, the attack can begin by measuring RTTs via the TCP segments whose role is to provide an ACK control bit and an Acknowledgment Number.
Configurations

No configuration.

History

21 Nov 2024, 09:28

Type Values Removed Values Added
References () https://github.com/IAIK/SnailLoad - () https://github.com/IAIK/SnailLoad -
References () https://news.ycombinator.com/item?id=40809629 - () https://news.ycombinator.com/item?id=40809629 -
References () https://twitter.com/tugraz/status/1805272833322299412 - () https://twitter.com/tugraz/status/1805272833322299412 -
References () https://www.instagram.com/p/C8wpO1UtExw/ - () https://www.instagram.com/p/C8wpO1UtExw/ -
References () https://www.rfc-editor.org/rfc/rfc9293.txt - () https://www.rfc-editor.org/rfc/rfc9293.txt -
References () https://www.snailload.com - () https://www.snailload.com -
References () https://www.snailload.com/snailload.pdf - () https://www.snailload.com/snailload.pdf -
References () https://www.tugraz.at/en/tu-graz/services/news-stories/tu-graz-news/singleview/article/neue-sicherheitsluecke-erlaubt-ueberwachung-besuchter-websites-und-angesehener-videos - () https://www.tugraz.at/en/tu-graz/services/news-stories/tu-graz-news/singleview/article/neue-sicherheitsluecke-erlaubt-ueberwachung-besuchter-websites-und-angesehener-videos -

05 Aug 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CWE CWE-1255

03 Jul 2024, 12:53

Type Values Removed Values Added
Summary
  • (es) El protocolo TCP en RFC 9293 tiene un canal lateral de temporización que facilita a atacantes remotos inferir el contenido de una conexión TCP desde un sistema cliente (a cualquier servidor), cuando ese sistema cliente está obteniendo simultáneamente datos TCP a una velocidad lenta desde un servidor controlado por un atacante, también conocido como el problema "SnailLoad". Por ejemplo, el ataque puede comenzar midiendo los RTT a través de los segmentos TCP cuya función es proporcionar un bit de control ACK y un número de reconocimiento.

03 Jul 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-03 04:15

Updated : 2024-11-21 09:28


NVD link : CVE-2024-39920

Mitre link : CVE-2024-39920

CVE.ORG link : CVE-2024-39920


JSON object : View

Products Affected

No product.

CWE
CWE-1255

Comparison Logic is Vulnerable to Power Side-Channel Attacks