Description
An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2687-1 | prosody security update |
Debian DLA |
DLA-2687-2 | prosody regression update |
Debian DSA |
DSA-4916-1 | prosody security update |
EUVD |
EUVD-2021-19643 | An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:33:56.162Z
Reserved: 2021-05-12T00:00:00.000Z
Link: CVE-2021-32921
No data.
Status : Modified
Published: 2021-05-13T16:15:08.407
Modified: 2024-11-21T06:07:55.843
Link: CVE-2021-32921
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD