Vulnerability Description
Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote attackers to obtain sensitive user password information via a timing side-channel attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bestpractical | Request Tracker | 4.0.0 |
References
- http://www.debian.org/security/2017/dsa-3882Third Party Advisory
- http://www.debian.org/security/2017/dsa-3883Third Party Advisory
- https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/3201Vendor Advisory
- http://www.debian.org/security/2017/dsa-3882Third Party Advisory
- http://www.debian.org/security/2017/dsa-3883Third Party Advisory
- https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/3201Vendor Advisory
FAQ
What is CVE-2017-5361?
CVE-2017-5361 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote attackers to obtain ...
How severe is CVE-2017-5361?
CVE-2017-5361 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5361?
Check the references section above for vendor advisories and patch information. Affected products include: Bestpractical Request Tracker.