The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html | Mailing List Third Party Advisory |
https://simplesamlphp.org/security/201703-01 | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html | Mailing List Third Party Advisory |
https://simplesamlphp.org/security/201703-01 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://simplesamlphp.org/security/201703-01 - Patch, Vendor Advisory |
Information
Published : 2017-09-01 21:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12872
Mitre link : CVE-2017-12872
CVE.ORG link : CVE-2017-12872
JSON object : View
Products Affected
debian
- debian_linux
simplesamlphp
- simplesamlphp
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor