Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9735

Опубликовано: 16 июн. 2017
Источник: debian

Описание

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jetty9fixed9.2.22-1package
jetty8removedpackage
jetty8no-dsajessiepackage
jettyremovedpackage
jettyno-dsajessiepackage

Примечания

  • https://github.com/eclipse/jetty.project/issues/1556

  • https://github.com/eclipse/jetty.project/commit/042f325f1cd6e7891d72c7e668f5947b5457dc02

  • https://github.com/eclipse/jetty.project/commit/f3751d70787fd8ab93932a51c60514c2eb37cb58

  • https://github.com/eclipse/jetty.project/commit/2baa1abe4b1c380a30deacca1ed367466a1a62ea

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

CVSS3: 5.1
redhat
больше 8 лет назад

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

CVSS3: 7.5
nvd
больше 8 лет назад

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

CVSS3: 7.5
github
больше 7 лет назад

Jetty vulnerable to exposure of sensitive information due to observable discrepancy