|Affected:||Apache CouchDB 0.8.0 to 0.10.1|
|Vendor:||The Apache Software Foundation|
Apache CouchDB versions prior to version 0.11.0 are vulnerable to timing attacks, also known as side-channel information leakage, due to using simple break-on-inequality string comparisons when verifying hashes and passwords.
A canonical description of the attack can be found in http://codahale.com/a-lesson-in-timing-attacks/
This issue was discovered by Jason Davies of the Apache CouchDB development team.