A flaw was found in nbdkit due to to improperly caching...
Low severity
Unreviewed
Published
Mar 4, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Mar 2, 2022
Published to the GitHub Advisory Database
Mar 4, 2022
Last updated
Feb 3, 2023
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
References