Race condition in radicale - CVE-2017-8342
Published: April 30, 2017 / Updated: August 8, 2020
Vulnerability identifier: #VU39097
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2017-8342
CWE-ID: CWE-362
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: radicale.org
Affected software:
radicale
radicale
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.
How to mitigate CVE-2017-8342
Install update from vendor's website.
Sources
- https://bugs.debian.org/861514
- https://github.com/Kozea/Radicale/blob/1.1.2/NEWS.rst
- https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d
- https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b
- https://lists.debian.org/debian-lts-announce/2020/04/msg00019.html