darkhttpd before 1.15 uses strcmp (which is not constant time) to verify authentication, which makes it easier for remote attackers to bypass authentication via a timing side channel.
{ "vanir_signatures": [ { "id": "CVE-2024-23771-76dc99a8", "digest": { "length": 843.0, "function_hash": "301461089074725362514853166162378530787" }, "signature_type": "Function", "target": { "file": "darkhttpd.c", "function": "process_request" }, "deprecated": false, "signature_version": "v1", "source": "https://github.com/emikulic/darkhttpd/commit/f477619d49f3c4de9ad59bd194265a48ddc03f04" }, { "id": "CVE-2024-23771-d16d511e", "digest": { "threshold": 0.9, "line_hashes": [ "81946186284761139741319147839175658108", "106561700882115311000739827306700002006", "147475379316013932829967109674435413800", "109742141827425869513194926466827679693", "282520728650876085544881849703476598750", "337677668882144958825087898724398115252", "330159131933400415522867574300121074704", "24003744035248388609520759344480901539", "5387317546012290782659143963283973787", "146694391410098652838281636396438849018", "315168707514352718894909127043319660850", "321136093263536869815987418935204363433" ] }, "signature_type": "Line", "target": { "file": "darkhttpd.c" }, "deprecated": false, "signature_version": "v1", "source": "https://github.com/emikulic/darkhttpd/commit/f477619d49f3c4de9ad59bd194265a48ddc03f04" } ] }