CVE-2017-9735

Source
https://cve.org/CVERecord?id=CVE-2017-9735
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9735.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-9735
Aliases
Downstream
Related
Published
2017-06-16T21:29:00.710Z
Modified
2026-02-05T01:56:11.088741Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

References

Affected packages

Git / github.com/eclipse/jetty.project

Affected ranges

Type
GIT
Repo
https://github.com/eclipse/jetty.project
Events

Affected versions

jetty-9.*
jetty-9.2.10.v20150310
jetty-9.2.11.M0
jetty-9.2.11.v20150528
jetty-9.2.11.v20150529
jetty-9.2.12.M0
jetty-9.2.12.v20150709
jetty-9.2.13.v20150730
jetty-9.2.14.v20151106
jetty-9.2.15.v20160210
jetty-9.2.16.v20160414
jetty-9.2.17.v20160517
jetty-9.2.18.v20160721
jetty-9.2.19.v20160908
jetty-9.2.20.v20161216
jetty-9.2.21.v20170120
jetty-9.2.4.v20141103
jetty-9.2.5.v20141112
jetty-9.2.6.v20141203
jetty-9.2.6.v20141205
jetty-9.2.7.v20150116
jetty-9.2.8.v20150217
jetty-9.2.9.v20150224
jetty-9.3.0.M0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9735.json"