ID CVE-2017-5361
Summary Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote attackers to obtain sensitive user password information via a timing side-channel attack.
References
Vulnerable Configurations
  • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.24:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.24:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.4.1:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:N/A:N
refmap via4
confirm https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016
debian
  • DSA-3882
  • DSA-3883
Last major update 03-10-2019 - 00:03
Published 03-07-2017 - 16:29
Last modified 03-10-2019 - 00:03
Back to Top