[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-32921Date: (C)2021-05-17   (M)2023-12-22


An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.9CVSS Score : 4.3
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
DSA-4916
FEDORA-2021-498be8f560
FEDORA-2021-a33f6e36e1
FEDORA-2021-b5d8c6d086
https://lists.debian.org/debian-lts-announce/2021/06/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00018.html
http://www.openwall.com/lists/oss-security/2021/05/13/1
http://www.openwall.com/lists/oss-security/2021/05/14/2
https://blog.prosody.im/prosody-0.11.9-released/
https://security.gentoo.org/glsa/202105-15

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:prosody:prosody
cpe:/a:lua:lua
CWE    1
CWE-362
OVAL    6
oval:org.secpod.oval:def:72082
oval:org.secpod.oval:def:120234
oval:org.secpod.oval:def:120233
oval:org.secpod.oval:def:1801975
...

© SecPod Technologies