The TCP protocol in RFC 9293 has a timing side channel that makes it easier for remote attackers to infer the content of one TCP connection from a client system (to any server), when that client system is concurrently obtaining TCP data at a slow rate from an attacker-controlled server, aka the "SnailLoad" issue. For example, the attack can begin by measuring RTTs via the TCP segments whose role is to provide an ACK control bit and an Acknowledgment Number.
References
Configurations
No configuration.
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/IAIK/SnailLoad - | |
References | () https://news.ycombinator.com/item?id=40809629 - | |
References | () https://twitter.com/tugraz/status/1805272833322299412 - | |
References | () https://www.instagram.com/p/C8wpO1UtExw/ - | |
References | () https://www.rfc-editor.org/rfc/rfc9293.txt - | |
References | () https://www.snailload.com - | |
References | () https://www.snailload.com/snailload.pdf - | |
References | () https://www.tugraz.at/en/tu-graz/services/news-stories/tu-graz-news/singleview/article/neue-sicherheitsluecke-erlaubt-ueberwachung-besuchter-websites-und-angesehener-videos - |
05 Aug 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CWE | CWE-1255 |
03 Jul 2024, 12:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Jul 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-03 04:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-39920
Mitre link : CVE-2024-39920
CVE.ORG link : CVE-2024-39920
JSON object : View
Products Affected
No product.
CWE
CWE-1255
Comparison Logic is Vulnerable to Power Side-Channel Attacks