Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1184

Опубликовано: 14 янв. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

upstream

released

5.5.34

Показывать по

РелизСтатусПримечание
devel

released

6.0.32-6ubuntu1
hardy

DNE

lucid

released

6.0.24-2ubuntu1.9
maverick

released

6.0.28-2ubuntu1.5
natty

released

6.0.28-10ubuntu2.2
oneiric

released

6.0.32-5ubuntu1.1
upstream

released

6.0.33

Показывать по

РелизСтатусПримечание
devel

not-affected

7.0.21-1
hardy

DNE

lucid

DNE

maverick

DNE

natty

DNE

oneiric

not-affected

7.0.21-1
upstream

released

7.0.12

Показывать по

EPSS

Процентиль: 90%
0.0527
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

nvd
больше 13 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

debian
больше 13 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat ...

github
около 3 лет назад

Authentication Bypass in Apache Tomcat

oracle-oval
больше 13 лет назад

ELSA-2011-1845: tomcat5 security update (MODERATE)

EPSS

Процентиль: 90%
0.0527
Низкий

5 Medium

CVSS2