CVE Vulnerabilities

CVE-2013-10031

Incorrect Comparison Logic Granularity

Published: Dec 09, 2025 | Modified: Dec 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Plack-Middleware-Session versions before 0.17 may be vulnerable to HMAC comparison timing attacks

Weakness

The product’s comparison logic is performed over a series of steps rather than across the entire string in one operation. If there is a comparison logic failure on one of these steps, the operation may be vulnerable to a timing attack that can result in the interception of the process for nefarious purposes.

Affected Software

Name Vendor Start Version End Version
Libplack-middleware-session-perl Ubuntu upstream *

Extended Description

Comparison logic is used to compare a variety of objects including passwords, Message Authentication Codes (MACs), and responses to verification challenges. When comparison logic is implemented at a finer granularity (e.g., byte-by-byte comparison) and breaks in the case of a comparison failure, an attacker can exploit this implementation to identify when exactly the failure occurred. With multiple attempts, the attacker may be able to guesses the correct password/response to challenge and elevate their privileges.

Potential Mitigations

  • The hardware designer should ensure that comparison logic is implemented so as to compare in one operation instead in smaller chunks.

References