Skip to content

Commit

Permalink
adds DHEater attack reported in #171
Browse files Browse the repository at this point in the history
  • Loading branch information
hcrudolph committed Sep 12, 2023
1 parent 688d5d6 commit 15ff919
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 1 deletion.
5 changes: 5 additions & 0 deletions directory/fixtures/00_vulnerabilities.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -88,3 +88,8 @@
fields:
severity: 0
description: 'The so-called <a href ="https://raccoon-attack.com" class="alert-link" target="_blank" rel="noopener noreferrer">Raccoon Attack</a> affects the specifications of TLS 1.2 and below when using a DH(E) key exchange. According to the researchers, while very hard to exploit, in rare circumstances this timing attack allows attackers to decrypt the connection between users and the server. A fix has been introduced in the TLS 1.3 specification.'
- model: directory.Vulnerability
pk: 'DHEat Attack'
fields:
severity: 1
description: 'The so-called <a href ="https://dheatattack.com" class="alert-link" target="_blank" rel="noopener noreferrer">DHEat Attack</a> affects cryptographic protocols using the Diffie Hellman key exchange (incl. TLS). According to its authors, it exploits a potocol particularity that may allow attackers to perform a DoS attack "with a low-bandwidth network connection without authentication, privilege, or user interaction."'
2 changes: 1 addition & 1 deletion directory/fixtures/01_technologies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@
pk: 'DHE'
fields:
long_name: 'Diffie-Hellman Ephemeral'
vulnerabilities: ['Raccoon Attack']
vulnerabilities: ['DHEat Attack', 'Raccoon Attack']
- model: directory.KexAlgorithm
pk: 'ECDH'
fields:
Expand Down

0 comments on commit 15ff919

Please sign in to comment.