CVE-2017-12872

The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.
Configurations

Configuration 1 (hide)

cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:10

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html - Mailing List, Third Party Advisory
References () https://simplesamlphp.org/security/201703-01 - Patch, Vendor Advisory () https://simplesamlphp.org/security/201703-01 - Patch, Vendor Advisory

Information

Published : 2017-09-01 21:29

Updated : 2024-11-21 03:10


NVD link : CVE-2017-12872

Mitre link : CVE-2017-12872

CVE.ORG link : CVE-2017-12872


JSON object : View

Products Affected

debian

  • debian_linux

simplesamlphp

  • simplesamlphp
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor