CVE-2012-5885

The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
VendorProductVersion
apachetomcat
5.5.0
apachetomcat
5.5.1
apachetomcat
5.5.2
apachetomcat
5.5.3
apachetomcat
5.5.4
apachetomcat
5.5.5
apachetomcat
5.5.6
apachetomcat
5.5.7
apachetomcat
5.5.8
apachetomcat
5.5.9
apachetomcat
5.5.10
apachetomcat
5.5.11
apachetomcat
5.5.12
apachetomcat
5.5.13
apachetomcat
5.5.14
apachetomcat
5.5.15
apachetomcat
5.5.16
apachetomcat
5.5.17
apachetomcat
5.5.18
apachetomcat
5.5.19
apachetomcat
5.5.20
apachetomcat
5.5.21
apachetomcat
5.5.22
apachetomcat
5.5.23
apachetomcat
5.5.24
apachetomcat
5.5.25
apachetomcat
5.5.26
apachetomcat
5.5.27
apachetomcat
5.5.28
apachetomcat
5.5.29
apachetomcat
5.5.30
apachetomcat
5.5.31
apachetomcat
5.5.32
apachetomcat
5.5.33
apachetomcat
5.5.34
apachetomcat
5.5.35
apachetomcat
6.0
apachetomcat
6.0.0
apachetomcat
6.0.0:alpha
apachetomcat
6.0.1
apachetomcat
6.0.1:alpha
apachetomcat
6.0.2
apachetomcat
6.0.2:alpha
apachetomcat
6.0.2:beta
apachetomcat
6.0.3
apachetomcat
6.0.4
apachetomcat
6.0.4:alpha
apachetomcat
6.0.5
apachetomcat
6.0.6
apachetomcat
6.0.6:alpha
apachetomcat
6.0.7
apachetomcat
6.0.7:alpha
apachetomcat
6.0.7:beta
apachetomcat
6.0.8
apachetomcat
6.0.8:alpha
apachetomcat
6.0.9
apachetomcat
6.0.9:beta
apachetomcat
6.0.10
apachetomcat
6.0.11
apachetomcat
6.0.12
apachetomcat
6.0.13
apachetomcat
6.0.14
apachetomcat
6.0.15
apachetomcat
6.0.16
apachetomcat
6.0.17
apachetomcat
6.0.18
apachetomcat
6.0.19
apachetomcat
6.0.20
apachetomcat
6.0.24
apachetomcat
6.0.26
apachetomcat
6.0.27
apachetomcat
6.0.28
apachetomcat
6.0.29
apachetomcat
6.0.30
apachetomcat
6.0.31
apachetomcat
6.0.32
apachetomcat
6.0.33
apachetomcat
6.0.35
apachetomcat
7.0.0
apachetomcat
7.0.0:beta
apachetomcat
7.0.1
apachetomcat
7.0.2
apachetomcat
7.0.2:beta
apachetomcat
7.0.3
apachetomcat
7.0.4
apachetomcat
7.0.4:beta
apachetomcat
7.0.5
apachetomcat
7.0.6
apachetomcat
7.0.7
apachetomcat
7.0.8
apachetomcat
7.0.9
apachetomcat
7.0.10
apachetomcat
7.0.11
apachetomcat
7.0.12
apachetomcat
7.0.13
apachetomcat
7.0.14
apachetomcat
7.0.15
apachetomcat
7.0.16
apachetomcat
7.0.17
apachetomcat
7.0.18
apachetomcat
7.0.19
apachetomcat
7.0.20
apachetomcat
7.0.21
apachetomcat
7.0.22
apachetomcat
7.0.23
apachetomcat
7.0.25
apachetomcat
7.0.28
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat5.5
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
dne
hardy
ignored
tomcat6
raring
not-affected
quantal
Fixed 6.0.35-5ubuntu0.1
released
precise
Fixed 6.0.35-1ubuntu3.1
released
oneiric
Fixed 6.0.32-5ubuntu1.3
released
lucid
Fixed 6.0.24-2ubuntu1.11
released
hardy
dne
tomcat7
raring
not-affected
quantal
not-affected
precise
Fixed 7.0.26-1ubuntu1.2
released
oneiric
Fixed 7.0.21-1ubuntu0.1
released
lucid
dne
hardy
dne
Common Weakness Enumeration
References