Bug ID | 1036972 |
---|---|
Summary | VUL-1: CVE-2017-8342: radicale: htpasswd authentication vulnerable to timing-based bruteforce attacks |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.2 |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | security-team@suse.de |
Reporter | mikhail.kasimov@gmail.com |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-8342 =================================================== Description Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method. Source: MITRE Last Modified: 04/30/2017 =================================================== Hyperlink [1] https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b [2] https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d [3] https://github.com/Kozea/Radicale/blob/1.1.2/NEWS.rst [4] https://bugs.debian.org/861514 (open-)SUSE: https://software.opensuse.org/package/Radicale 1.1.1 (TW, 42.{1,2}, network repo)