CVE-2017-8342
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
30/04/2017
Last modified:
20/04/2025
Description
Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:radicale:radicale:*:*:*:*:*:*:*:* | 1.1.1 (including) | |
| cpe:2.3:a:radicale:radicale:2.0.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugs.debian.org/861514
- https://github.com/Kozea/Radicale/blob/1.1.2/NEWS.rst
- https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d
- https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b
- https://lists.debian.org/debian-lts-announce/2020/04/msg00019.html
- https://bugs.debian.org/861514
- https://github.com/Kozea/Radicale/blob/1.1.2/NEWS.rst
- https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d
- https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b
- https://lists.debian.org/debian-lts-announce/2020/04/msg00019.html



