Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1184

Опубликовано: 26 сент. 2011
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certificate System 7.3AuthenticationWill not fix
Red Hat Developer Suite v.3PlatformWill not fix
Red Hat Satellite 5.4ServerWill not fix
JBEWP 5 for RHEL 5jbosswebFixedRHSA-2012:007631.01.2012
JBEWP 5 for RHEL 6jbosswebFixedRHSA-2012:007631.01.2012
JBoss Communications Platform 5.1FixedRHSA-2012:007831.01.2012
JBoss Enterprise BRMS Platform 5.1FixedRHSA-2012:032522.02.2012
Red Hat Enterprise Linux 5tomcat5FixedRHSA-2011:184520.12.2011
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2011:178005.12.2011
Red Hat JBoss Enterprise Application Platform 4.3FixedRHSA-2012:004119.01.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=741401tomcat: Multiple weaknesses in HTTP DIGEST authentication

EPSS

Процентиль: 90%
0.0527
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

nvd
больше 13 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

debian
больше 13 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat ...

github
около 3 лет назад

Authentication Bypass in Apache Tomcat

oracle-oval
больше 13 лет назад

ELSA-2011-1845: tomcat5 security update (MODERATE)

EPSS

Процентиль: 90%
0.0527
Низкий

4.3 Medium

CVSS2