Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-8019

Опубликовано: 31 июл. 2018
Источник: nvd
CVSS3: 7.4
CVSS2: 4.3
EPSS Низкий

Описание

When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:apache:tomcat_native:*:*:*:*:*:*:*:*
Версия от 1.1.23 (включая) до 1.1.34 (включая)
cpe:2.3:a:apache:tomcat_native:*:*:*:*:*:*:*:*
Версия от 1.2.0 (включая) до 1.2.16 (включая)

EPSS

Процентиль: 75%
0.00897
Низкий

7.4 High

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-295

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 7 лет назад

When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.

CVSS3: 5.9
redhat
больше 7 лет назад

When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.

CVSS3: 7.4
debian
больше 7 лет назад

When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and ...

CVSS3: 7.4
github
больше 3 лет назад

When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.

suse-cvrf
почти 7 лет назад

Security update for libtcnative-1-0

EPSS

Процентиль: 75%
0.00897
Низкий

7.4 High

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-295