CVE-2017-2585
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
12/03/2018
Last modified:
12/04/2018
Description
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* | 2.5.1 (excluding) | |
| cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:single_sign_on:7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



