CVE-2017-5361

NameCVE-2017-5361
DescriptionRequest Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote attackers to obtain sensitive user password information via a timing side-channel attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-987-1, DLA-988-1, DSA-3882-1, DSA-3883-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
request-tracker4 (PTS)wheezy4.0.7-5+deb7u4vulnerable
wheezy (security)4.0.7-5+deb7u5fixed
jessie (security), jessie4.2.8-3+deb8u2fixed
stretch4.4.1-3+deb9u2fixed
stretch (security)4.4.1-3+deb9u1fixed
sid, buster4.4.1-5fixed
rt-authen-externalauth (PTS)wheezy0.10-4vulnerable
wheezy (security)0.10-4+deb7u1fixed
jessie (security), jessie0.25-1+deb8u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
request-tracker4source(unstable)4.4.1-4medium
request-tracker4sourcejessie4.2.8-3+deb8u2mediumDSA-3882-1
request-tracker4sourcestretch4.4.1-3+deb9u1mediumDSA-3882-1
request-tracker4sourcewheezy4.0.7-5+deb7u5mediumDLA-987-1
rt-authen-externalauthsource(unstable)(unfixed)medium
rt-authen-externalauthsourcejessie0.25-1+deb8u1mediumDSA-3883-1
rt-authen-externalauthsourcewheezy0.10-4+deb7u1mediumDLA-988-1

Notes

https://github.com/bestpractical/rt-authen-externalauth/commit/436255c04b4881bb6d8eec9a57b8593033d863a9

Search for package or bug name: Reporting problems