The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2725-1 | tomcat6 security update |
EUVD |
EUVD-2022-3341 | The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184. |
Github GHSA |
GHSA-99rf-92v6-cwx4 | Improper Access Control in Apache Tomcat |
Ubuntu USN |
USN-1637-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T21:21:27.917Z
Reserved: 2012-11-17T00:00:00
Link: CVE-2012-5885
No data.
Status : Deferred
Published: 2012-11-17T19:55:02.673
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-5885
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN