CVE-2012-5885
Published: 17 November 2012
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
Notes
Author | Note |
---|---|
mdeslaur | This was originally called CVE-2012-3439 |
Priority
Status
Package | Release | Status |
---|---|---|
tomcat5.5 Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
upstream |
Needed
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1392248 |
||
tomcat6 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Released
(6.0.24-2ubuntu1.11)
|
|
oneiric |
Released
(6.0.32-5ubuntu1.3)
|
|
precise |
Released
(6.0.35-1ubuntu3.1)
|
|
quantal |
Released
(6.0.35-5ubuntu0.1)
|
|
raring |
Not vulnerable
(6.0.35-6)
|
|
upstream |
Released
(6.0.35-5+nmu1)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1380829 |
||
tomcat7 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
oneiric |
Released
(7.0.21-1ubuntu0.1)
|
|
precise |
Released
(7.0.26-1ubuntu1.2)
|
|
quantal |
Not vulnerable
(7.0.30-0ubuntu1)
|
|
raring |
Not vulnerable
|
|
upstream |
Released
(7.0.30)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1377807 |