CVE-2012-5885
Publication date 17 November 2012
Last updated 24 July 2024
Ubuntu priority
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
Status
Package | Ubuntu Release | Status |
---|---|---|
tomcat5.5 | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored end of life | |
tomcat6 | 13.04 raring |
Not affected
|
12.10 quantal |
Fixed 6.0.35-5ubuntu0.1
|
|
12.04 LTS precise |
Fixed 6.0.35-1ubuntu3.1
|
|
11.10 oneiric |
Fixed 6.0.32-5ubuntu1.3
|
|
10.04 LTS lucid |
Fixed 6.0.24-2ubuntu1.11
|
|
8.04 LTS hardy | Not in release | |
tomcat7 | 13.04 raring |
Not affected
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Fixed 7.0.26-1ubuntu1.2
|
|
11.10 oneiric |
Fixed 7.0.21-1ubuntu0.1
|
|
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release |
Notes
Patch details
Package | Patch details |
---|---|
tomcat5.5 | |
tomcat6 | |
tomcat7 |
References
Related Ubuntu Security Notices (USN)
- USN-1637-1
- Tomcat vulnerabilities
- 21 November 2012