CVE-2012-5885
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
17/11/2012
Last modified:
11/04/2025
Description
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136612293908376&w=2
- http://marc.info/?l=bugtraq&m=136612293908376&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0623.html
- http://rhn.redhat.com/errata/RHSA-2013-0629.html
- http://rhn.redhat.com/errata/RHSA-2013-0631.html
- http://rhn.redhat.com/errata/RHSA-2013-0632.html
- http://rhn.redhat.com/errata/RHSA-2013-0633.html
- http://rhn.redhat.com/errata/RHSA-2013-0640.html
- http://rhn.redhat.com/errata/RHSA-2013-0647.html
- http://rhn.redhat.com/errata/RHSA-2013-0648.html
- http://rhn.redhat.com/errata/RHSA-2013-0726.html
- http://secunia.com/advisories/51371
- http://svn.apache.org/viewvc?view=revision&revision=1377807
- http://svn.apache.org/viewvc?view=revision&revision=1380829
- http://svn.apache.org/viewvc?view=revision&revision=1392248
- http://tomcat.apache.org/security-5.html
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-7.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21626891
- http://www.securityfocus.com/bid/56403
- http://www.ubuntu.com/usn/USN-1637-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80408
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19432
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136612293908376&w=2
- http://marc.info/?l=bugtraq&m=136612293908376&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0623.html
- http://rhn.redhat.com/errata/RHSA-2013-0629.html
- http://rhn.redhat.com/errata/RHSA-2013-0631.html
- http://rhn.redhat.com/errata/RHSA-2013-0632.html
- http://rhn.redhat.com/errata/RHSA-2013-0633.html
- http://rhn.redhat.com/errata/RHSA-2013-0640.html
- http://rhn.redhat.com/errata/RHSA-2013-0647.html
- http://rhn.redhat.com/errata/RHSA-2013-0648.html
- http://rhn.redhat.com/errata/RHSA-2013-0726.html
- http://secunia.com/advisories/51371
- http://svn.apache.org/viewvc?view=revision&revision=1377807
- http://svn.apache.org/viewvc?view=revision&revision=1380829
- http://svn.apache.org/viewvc?view=revision&revision=1392248
- http://tomcat.apache.org/security-5.html
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-7.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21626891
- http://www.securityfocus.com/bid/56403
- http://www.ubuntu.com/usn/USN-1637-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80408
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19432



