Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-9735

Опубликовано: 16 мая 2017
Источник: redhat
CVSS3: 5.1

Описание

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6jetty-eclipseWill not fix
Red Hat Enterprise Linux 7jettyWill not fix
Red Hat JBoss Fuse Integration Service 2jettyAffected
Red Hat Software Collectionsrh-java-common-jettyWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1464158jetty: Timing channel attack in util/security/Password.java

5.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

CVSS3: 7.5
nvd
больше 8 лет назад

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

CVSS3: 7.5
debian
больше 8 лет назад

Jetty through 9.4.x is prone to a timing channel in util/security/Pass ...

CVSS3: 7.5
github
больше 7 лет назад

Jetty vulnerable to exposure of sensitive information due to observable discrepancy

5.1 Medium

CVSS3