Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-2585

Опубликовано: 04 апр. 2017
Источник: redhat
CVSS3: 3.7
CVSS2: 2.6

Описание

Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.

It was found that keycloak's implementation of HMAC verification for JWS tokens uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Mobile Application Platform 4keycloakWill not fix
Red Hat Single Sign-On 7.1FixedRHSA-2017:087604.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7FixedRHSA-2017:087204.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-freemarkerFixedRHSA-2017:087204.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-javapackages-toolsFixedRHSA-2017:087204.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-keycloakFixedRHSA-2017:087204.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-libunix-dbus-javaFixedRHSA-2017:087204.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-liquibaseFixedRHSA-2017:087204.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-twitter4jFixedRHSA-2017:087204.04.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-zxingFixedRHSA-2017:087204.04.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1412376keycloak: timing attack in JWS signature verification

3.7 Low

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 5.9
nvd
почти 8 лет назад

Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.

CVSS3: 5.9
debian
почти 8 лет назад

Red Hat Keycloak before version 2.5.1 has an implementation of HMAC ve ...

CVSS3: 5.9
github
больше 7 лет назад

keycloak-core vulnerable to timing attacks against JWS token verification

3.7 Low

CVSS3

2.6 Low

CVSS2