ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"fixed": "8.17"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"fixed": "3.0.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "33"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "34"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "35"
}
],
"source": "CPE_FIELD"
}
]
}