tinc VPN Replay Attack Vulnerability...

- AV AC AU C I A
发布: 2001-12-29
修订: 2025-04-13

tinc is a Virtual Private Network (VPN) daemon designed for Linux and Unix based systems. It acts as a tunnel for a network interface, and embeds all communication into a sequence of encrypted UDP packets. This allows private network communication to occur through a larger network. tinc uses blowfish in cipher block chaining (CBC) mode to encrypt packets. The secret key is shared via a PKI-style handshake during the authentication process between two tinc daemons. An attacker may be able to take advantage of knowledge about the structure of network traffic. If an attacker is aware that two packets will have similar payloads, he may substitute one for the other through a man in the middle attack. Some network communication, such as that using the UDP protocol, may not be able to detect this modification. In order to exploit this vulnerability, the attacker must be able to modify network traffic. A man in the middle attack may be difficult, as tinc includes support for secure...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息