Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1312

Опубликовано: 26 мар. 2018
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 9.8

Описание

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.

РелизСтатусПримечание
artful

released

2.4.27-2ubuntu4.1
bionic

released

2.4.29-1ubuntu4.1
cosmic

released

2.4.29-1ubuntu4.1
devel

released

2.4.29-1ubuntu4.1
esm-infra-legacy/trusty

released

2.4.7-1ubuntu4.20
esm-infra/bionic

released

2.4.29-1ubuntu4.1
esm-infra/xenial

released

2.4.18-2ubuntu3.8
precise/esm

not-affected

2.2.22-1ubuntu1.15
trusty

released

2.4.7-1ubuntu4.20
trusty/esm

released

2.4.7-1ubuntu4.20

Показывать по

EPSS

Процентиль: 91%
0.06949
Низкий

6.8 Medium

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 4.2
redhat
почти 8 лет назад

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.

CVSS3: 9.8
nvd
почти 8 лет назад

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.

CVSS3: 9.8
debian
почти 8 лет назад

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authen ...

CVSS3: 9.8
github
больше 3 лет назад

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.

oracle-oval
больше 6 лет назад

ELSA-2019-1898: httpd security update (LOW)

EPSS

Процентиль: 91%
0.06949
Низкий

6.8 Medium

CVSS2

9.8 Critical

CVSS3