CVE-2012-5887
Published: 17 November 2012
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
Notes
Author | Note |
---|---|
mdeslaur | This was originally called CVE-2012-3439 same fix as CVE-2012-5885 |
Priority
Status
Package | Release | Status |
---|---|---|
tomcat5.5 Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
upstream |
Needed
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1392248 |
||
tomcat6 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Released
(6.0.24-2ubuntu1.11)
|
|
oneiric |
Released
(6.0.32-5ubuntu1.3)
|
|
precise |
Released
(6.0.35-1ubuntu3.1)
|
|
quantal |
Released
(6.0.35-5ubuntu0.1)
|
|
raring |
Not vulnerable
(6.0.35-6)
|
|
upstream |
Released
(6.0.35-5+nmu1)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1380829 |
||
tomcat7 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
oneiric |
Released
(7.0.21-1ubuntu0.1)
|
|
precise |
Released
(7.0.26-1ubuntu1.2)
|
|
quantal |
Not vulnerable
(7.0.30-0ubuntu1)
|
|
raring |
Not vulnerable
|
|
upstream |
Released
(7.0.30)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1377807 |