[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255861

 
 

909

 
 

199025

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:004 -- Mandriva tomcat5

ID: oval:org.secpod.oval:def:1300151Date: (C)2013-03-22   (M)2023-12-07
Class: PATCHFamily: unix




Multiple vulnerabilites has been found and corrected in tomcat5: The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce values instead of nonce and nc values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184 . The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID . The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests . The updated packages have been patched to correct these issues.

Platform:
Mandriva Enterprise Server 5.2
Product:
tomcat5
Reference:
MDVSA-2013:004
CVE-2011-1184
CVE-2012-5885
CVE-2012-5886
CVE-2012-5887
CVE    4
CVE-2011-1184
CVE-2012-5885
CVE-2012-5886
CVE-2012-5887
...
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies