Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-5885

Опубликовано: 17 нояб. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

not-affected

6.0.35-6
hardy

DNE

lucid

released

6.0.24-2ubuntu1.11
oneiric

released

6.0.32-5ubuntu1.3
precise

released

6.0.35-1ubuntu3.1
quantal

released

6.0.35-5ubuntu0.1
raring

not-affected

6.0.35-6
upstream

released

6.0.35-5+nmu1

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

oneiric

released

7.0.21-1ubuntu0.1
precise

released

7.0.26-1ubuntu1.2
quantal

not-affected

7.0.30-0ubuntu1
raring

not-affected

upstream

released

7.0.30

Показывать по

EPSS

Процентиль: 87%
0.0335
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.

nvd
больше 12 лет назад

The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.

debian
больше 12 лет назад

The replay-countermeasure functionality in the HTTP Digest Access Auth ...

github
около 3 лет назад

Improper Access Control in Apache Tomcat

oracle-oval
больше 12 лет назад

ELSA-2013-0640: tomcat5 security update (IMPORTANT)

EPSS

Процентиль: 87%
0.0335
Низкий

5 Medium

CVSS2

Уязвимость CVE-2012-5885