Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 886031 - (CVE-2012-5055) CVE-2012-5055 Spring Security: Ability to determine if username is valid via DaoAuthenticationProvider
CVE-2012-5055 Spring Security: Ability to determine if username is valid via ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20121009,reported=2...
: Security
Depends On: 896347
Blocks: 886032
  Show dependency treegraph
 
Reported: 2012-12-11 06:04 EST by Jan Lieskovsky
Modified: 2013-03-14 14:21 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-03-14 14:21:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0649 normal SHIPPED_LIVE Important: Fuse ESB Enterprise 7.1.0 update 2013-03-14 16:48:11 EDT

  None (edit)
Description Jan Lieskovsky 2012-12-11 06:04:21 EST
A security flaw was found in the way DaoAuthenticationProvider of Spring Security Framework performed user authentication. A remote attacker could use this flaw to determine if a particular user name was valid via time difference in cases, when authenticating existing versus non-existing user(s).

References:
[1] http://support.springsource.com/security/cve-2012-5055
Comment 3 errata-xmlrpc 2013-03-14 12:48:59 EDT
This issue has been addressed in following products:

  Fuse ESB Enterprise 7.1.0 Patch 3

Via RHSA-2013:0649 https://rhn.redhat.com/errata/RHSA-2013-0649.html
Comment 4 Vincent Danen 2013-03-14 13:08:54 EDT
Statement:

(none)

Note You need to log in before you can comment on or make changes to this bug.