5
CVSSv2

CVE-2017-9735

Published: 16/06/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Jetty up to and including 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote malicious users to obtain access by observing elapsed times before rejection of incorrect passwords.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

eclipse jetty

debian debian linux 9.0

oracle retail xstore point of service 15.0

oracle retail xstore point of service 7.1

oracle hospitality guest access 4.2.0

oracle hospitality guest access 4.2.1

oracle retail xstore point of service 16.0

oracle enterprise manager base platform 13.3

oracle enterprise manager base platform 13.2

oracle retail xstore point of service 17.0

oracle rest data services 12.2.0.1

oracle rest data services 12.1.0.2

oracle rest data services 11.2.0.4

oracle rest data services 18c

oracle communications cloud native core policy 1.5.0

Vendor Advisories

Debian Bug report logs - #864898 jetty9: CVE-2017-9735: timing channel in Passwordjava Package: src:jetty9; Maintainer for src:jetty9 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 16 Jun 2017 18:51:01 UTC Severity: importan ...
Jetty through 94x is prone to a timing channel in util/security/Passwordjava, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords ...