{"id":"CVE-2017-5361","details":"Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 does not use a constant-time comparison algorithm for secrets, which makes it easier for remote attackers to obtain sensitive user password information via a timing side-channel attack.","modified":"2026-04-16T06:22:22.168969070Z","published":"2017-07-03T16:29:00.480Z","references":[{"type":"ADVISORY","url":"https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3882"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3883"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-5361.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.4"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.6"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.8"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.9"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.11"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.12"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.13"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.14"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.15"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.16"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.17"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.18"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.19"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.20"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.21"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.22"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.23"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.24"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.3"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.4"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.6"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.8"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.9"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.11"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.12"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.13"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}