Apache CouchDB 0.10.1 Timing Attack Vulnerability

2010-04-06 / 2010-04-07
Credit: Jan Lehnardt
Risk: High
Local: No
Remote: Yes
CWE: CWE-200


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

CVE-2008-2370: Apache CouchDB Timing Attack Vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache CouchDB 0.8.0 to 0.10.1 Description: Apache CouchDB versions prior to version 0.11.0 are vulnerable to timing attacks, also known as side-channel information leakage, due to using simple break-on-inequality string comparisons when verifying hashes and passwords. Mitigation: All users should upgrade to CouchDB 0.11.0. Upgrades from the 0.10.x series should be seamless. Users on earlier versions should consult http://wiki.apache.org/couchdb/Breaking_changes Example: A canonical description of the attack can be found in http://codahale.com/a-lesson-in-timing-attacks/ Credit: This issue was discovered by Jason Davies of the Apache CouchDB development team. References: http://couchdb.apache.org/ http://couchdb.apache.org/downloads.html http://wiki.apache.org/couchdb/Breaking_changes http://codahale.com/a-lesson-in-timing-attacks/ Jan Lehnardt --

References:

http://couchdb.apache.org/security.html
https://bugzilla.redhat.com/show_bug.cgi?id=578572
http://www.securityfocus.com/bid/39116
http://www.securityfocus.com/archive/1/archive/1/510427/100/0/threaded
http://www.osvdb.org/63350
http://secunia.com/advisories/39146
http://archives.neohapsis.com/archives/bugtraq/2010-03/0267.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top