Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4BB385CE.5060208@redhat.com>
Date: Wed, 31 Mar 2010 19:26:38 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>,
        Jan Lehnardt <jan@...che.org>
Subject: CVE Request -- Apache CouchDB v.0.11.0 -- timing attacks flaw

Hi Steve, vendors,

   Apache CouchDB upstream has released latest, v.0.11.0
version, addressing timing attack flaw(s). More from Bugtraq
post:
   [1] http://seclists.org/bugtraq/2010/Mar/254

"Apache CouchDB versions prior to version 0.11.0 are vulnerable to
timing attacks, also known as side-channel information leakage,
due to using simple break-on-inequality string comparisons when
verifying hashes and passwords."

References:
   [2] http://wiki.apache.org/couchdb/Breaking_changes
   [3] http://codahale.com/a-lesson-in-timing-attacks/
   [4] http://couchdb.apache.org/
   [5] http://couchdb.apache.org/downloads.html

Credit:
   Jason Davies of the Apache CouchDB development team

[1] references CVE-2008-2370 as CVE id, but CVE-2008-2370 is Apache Tomcat flaw:
   [6] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370

Since Apache CouchDB is different code base, susceptible to the same
issue as in [3], assuming new CVE identifier is required.

Steve, could you allocate one?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.