The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html | Mailing List Third Party Advisory |
https://simplesamlphp.org/security/201703-01 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-09-01 21:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-12872
Mitre link : CVE-2017-12872
CVE.ORG link : CVE-2017-12872
JSON object : View
Products Affected
simplesamlphp
- simplesamlphp
debian
- debian_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor