Bug 886031 (CVE-2012-5055) - CVE-2012-5055 Spring Security: Ability to determine if username is valid via DaoAuthenticationProvider
Summary: CVE-2012-5055 Spring Security: Ability to determine if username is valid via ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-5055
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 896347
Blocks: 886032
TreeView+ depends on / blocked
 
Reported: 2012-12-11 11:04 UTC by Jan Lieskovsky
Modified: 2021-02-17 08:16 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-03-14 18:21:11 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0649 0 normal SHIPPED_LIVE Important: Fuse ESB Enterprise 7.1.0 update 2013-03-14 20:48:11 UTC

Description Jan Lieskovsky 2012-12-11 11:04:21 UTC
A security flaw was found in the way DaoAuthenticationProvider of Spring Security Framework performed user authentication. A remote attacker could use this flaw to determine if a particular user name was valid via time difference in cases, when authenticating existing versus non-existing user(s).

References:
[1] http://support.springsource.com/security/cve-2012-5055

Comment 3 errata-xmlrpc 2013-03-14 16:48:59 UTC
This issue has been addressed in following products:

  Fuse ESB Enterprise 7.1.0 Patch 3

Via RHSA-2013:0649 https://rhn.redhat.com/errata/RHSA-2013-0649.html

Comment 4 Vincent Danen 2013-03-14 17:08:54 UTC
Statement:

(none)


Note You need to log in before you can comment on or make changes to this bug.