Lucene search

K
cve[email protected]CVE-2016-4423
HistoryJun 01, 2016 - 10:59 p.m.

CVE-2016-4423

2016-06-0122:59:02
CWE-399
web.nvd.nist.gov
42
cve-2016-4423
symfony
authentication
dos
username length
security vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

84.0%

The attemptAuthentication function in Component/Security/Http/Firewall/UsernamePasswordFormAuthenticationListener.php in Symfony before 2.3.41, 2.7.x before 2.7.13, 2.8.x before 2.8.6, and 3.0.x before 3.0.6 does not limit the length of a username stored in a session, which allows remote attackers to cause a denial of service (session storage consumption) via a series of authentication attempts with long, non-existent usernames.

Affected configurations

NVD
Node
sensiolabssymfonyRange2.3.40
OR
sensiolabssymfonyMatch2.7.0
OR
sensiolabssymfonyMatch2.7.1
OR
sensiolabssymfonyMatch2.7.2
OR
sensiolabssymfonyMatch2.7.3
OR
sensiolabssymfonyMatch2.7.4
OR
sensiolabssymfonyMatch2.7.5
OR
sensiolabssymfonyMatch2.7.6
OR
sensiolabssymfonyMatch2.7.7
OR
sensiolabssymfonyMatch2.7.8
OR
sensiolabssymfonyMatch2.7.9
OR
sensiolabssymfonyMatch2.7.10
OR
sensiolabssymfonyMatch2.7.11
OR
sensiolabssymfonyMatch2.7.12
OR
sensiolabssymfonyMatch2.8.0
OR
sensiolabssymfonyMatch2.8.1
OR
sensiolabssymfonyMatch2.8.2
OR
sensiolabssymfonyMatch2.8.3
OR
sensiolabssymfonyMatch2.8.4
OR
sensiolabssymfonyMatch2.8.5
OR
sensiolabssymfonyMatch3.0.0
OR
sensiolabssymfonyMatch3.0.1
OR
sensiolabssymfonyMatch3.0.2
OR
sensiolabssymfonyMatch3.0.3
OR
sensiolabssymfonyMatch3.0.4
OR
sensiolabssymfonyMatch3.0.5
Node
debiandebian_linuxMatch8.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

84.0%