CVE-2012-5886
Publication date 17 November 2012
Last updated 24 July 2024
Ubuntu priority
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
Status
Package | Ubuntu Release | Status |
---|---|---|
tomcat5.5 | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored end of life | |
tomcat6 | 13.04 raring |
Not affected
|
12.10 quantal |
Fixed 6.0.35-5ubuntu0.1
|
|
12.04 LTS precise |
Fixed 6.0.35-1ubuntu3.1
|
|
11.10 oneiric |
Fixed 6.0.32-5ubuntu1.3
|
|
10.04 LTS lucid |
Fixed 6.0.24-2ubuntu1.11
|
|
8.04 LTS hardy | Not in release | |
tomcat7 | 13.04 raring |
Not affected
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Fixed 7.0.26-1ubuntu1.2
|
|
11.10 oneiric |
Fixed 7.0.21-1ubuntu0.1
|
|
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release |
Notes
Patch details
Package | Patch details |
---|---|
tomcat5.5 | |
tomcat6 | |
tomcat7 |
References
Related Ubuntu Security Notices (USN)
- USN-1637-1
- Tomcat vulnerabilities
- 21 November 2012