Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-5064

Опубликовано: 26 сент. 2011
Источник: redhat
CVSS2: 4.3

Описание

DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=741401tomcat: Multiple weaknesses in HTTP DIGEST authentication

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 14 лет назад

DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184.

nvd
около 14 лет назад

DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184.

debian
около 14 лет назад

DigestAuthenticator.java in the HTTP Digest Access Authentication impl ...

github
почти 4 года назад

Use of Hard-coded Cryptographic Key in Apache Tomcat

oracle-oval
больше 14 лет назад

ELSA-2011-1845: tomcat5 security update (MODERATE)

4.3 Medium

CVSS2