Bug 1036972 (CVE-2017-8342) - VUL-1: CVE-2017-8342: Radicale: htpasswd authentication vulnerable to timing-based bruteforce attacks
Summary: VUL-1: CVE-2017-8342: Radicale: htpasswd authentication vulnerable to timing-...
Status: RESOLVED FIXED
Alias: CVE-2017-8342
Product: openSUSE.org
Classification: openSUSE
Component: 3rd party software (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Ákos Szőts
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-04-30 17:09 UTC by Mikhail Kasimov
Modified: 2017-05-01 09:20 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Mikhail Kasimov 2017-04-30 17:09:36 UTC
Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-8342
===================================================
Description

Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.

Source:  MITRE      Last Modified:  04/30/2017
===================================================

Hyperlink

[1] https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b

[2] https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d

[3] https://github.com/Kozea/Radicale/blob/1.1.2/NEWS.rst

[4] https://bugs.debian.org/861514

(open-)SUSE: https://software.opensuse.org/package/Radicale

1.1.1 (TW, 42.{1,2}, network repo)
Comment 1 Andreas Stieger 2017-05-01 08:43:24 UTC
Not in the distribution, assigning to maintainer
Comment 2 Ákos Szőts 2017-05-01 09:13:22 UTC
Radicale 1.1.2 built in network/Radicale.
Comment 3 Mikhail Kasimov 2017-05-01 09:20:50 UTC
Thanks for fixing!