darkhttpd before 1.15 uses strcmp (which is not constant time) to verify authentication, which makes it easier for remote attackers to bypass authentication via a timing side channel.
[
{
"source": "https://github.com/emikulic/darkhttpd/commit/f477619d49f3c4de9ad59bd194265a48ddc03f04",
"target": {
"function": "process_request",
"file": "darkhttpd.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2024-23771-76dc99a8",
"signature_type": "Function",
"digest": {
"length": 843.0,
"function_hash": "301461089074725362514853166162378530787"
}
},
{
"source": "https://github.com/emikulic/darkhttpd/commit/f477619d49f3c4de9ad59bd194265a48ddc03f04",
"target": {
"file": "darkhttpd.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2024-23771-d16d511e",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"81946186284761139741319147839175658108",
"106561700882115311000739827306700002006",
"147475379316013932829967109674435413800",
"109742141827425869513194926466827679693",
"282520728650876085544881849703476598750",
"337677668882144958825087898724398115252",
"330159131933400415522867574300121074704",
"24003744035248388609520759344480901539",
"5387317546012290782659143963283973787",
"146694391410098652838281636396438849018",
"315168707514352718894909127043319660850",
"321136093263536869815987418935204363433"
]
}
}
]