Timing Attack Affecting org.apache.directory.api:api-all Open this link in a new tab package, versions [,1.0.0-M31)


0.0
high
  • Attack Complexity

    Low

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEDIRECTORYAPI-30593

  • published

    7 Jul 2015

  • disclosed

    7 Jul 2015

  • credit

    Unknown

Overview

org.apache.directory.api:api-all Affected versions of the package are vulnerable to Timing Attack due to using the Arrays.equals to validate the password, which is vulnerable to a brute force attacks by malicious users.

References