CVE-2012-5885

EUVD-2022-3341
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
Affected Products (NVD)
VendorProductVersion
apachetomcat
5.5.0
apachetomcat
5.5.1
apachetomcat
5.5.2
apachetomcat
5.5.3
apachetomcat
5.5.4
apachetomcat
5.5.5
apachetomcat
5.5.6
apachetomcat
5.5.7
apachetomcat
5.5.8
apachetomcat
5.5.9
apachetomcat
5.5.10
apachetomcat
5.5.11
apachetomcat
5.5.12
apachetomcat
5.5.13
apachetomcat
5.5.14
apachetomcat
5.5.15
apachetomcat
5.5.16
apachetomcat
5.5.17
apachetomcat
5.5.18
apachetomcat
5.5.19
apachetomcat
5.5.20
apachetomcat
5.5.21
apachetomcat
5.5.22
apachetomcat
5.5.23
apachetomcat
5.5.24
apachetomcat
5.5.25
apachetomcat
5.5.26
apachetomcat
5.5.27
apachetomcat
5.5.28
apachetomcat
5.5.29
apachetomcat
5.5.30
apachetomcat
5.5.31
apachetomcat
5.5.32
apachetomcat
5.5.33
apachetomcat
5.5.34
apachetomcat
5.5.35
apachetomcat
6.0
apachetomcat
6.0.0
apachetomcat
6.0.0:alpha
apachetomcat
6.0.1
apachetomcat
6.0.1:alpha
apachetomcat
6.0.2
apachetomcat
6.0.2:alpha
apachetomcat
6.0.2:beta
apachetomcat
6.0.3
apachetomcat
6.0.4
apachetomcat
6.0.4:alpha
apachetomcat
6.0.5
apachetomcat
6.0.6
apachetomcat
6.0.6:alpha
apachetomcat
6.0.7
apachetomcat
6.0.7:alpha
apachetomcat
6.0.7:beta
apachetomcat
6.0.8
apachetomcat
6.0.8:alpha
apachetomcat
6.0.9
apachetomcat
6.0.9:beta
apachetomcat
6.0.10
apachetomcat
6.0.11
apachetomcat
6.0.12
apachetomcat
6.0.13
apachetomcat
6.0.14
apachetomcat
6.0.15
apachetomcat
6.0.16
apachetomcat
6.0.17
apachetomcat
6.0.18
apachetomcat
6.0.19
apachetomcat
6.0.20
apachetomcat
6.0.24
apachetomcat
6.0.26
apachetomcat
6.0.27
apachetomcat
6.0.28
apachetomcat
6.0.29
apachetomcat
6.0.30
apachetomcat
6.0.31
apachetomcat
6.0.32
apachetomcat
6.0.33
apachetomcat
6.0.35
apachetomcat
7.0.0
apachetomcat
7.0.0:beta
apachetomcat
7.0.1
apachetomcat
7.0.2
apachetomcat
7.0.2:beta
apachetomcat
7.0.3
apachetomcat
7.0.4
apachetomcat
7.0.4:beta
apachetomcat
7.0.5
apachetomcat
7.0.6
apachetomcat
7.0.7
apachetomcat
7.0.8
apachetomcat
7.0.9
apachetomcat
7.0.10
apachetomcat
7.0.11
apachetomcat
7.0.12
apachetomcat
7.0.13
apachetomcat
7.0.14
apachetomcat
7.0.15
apachetomcat
7.0.16
apachetomcat
7.0.17
apachetomcat
7.0.18
apachetomcat
7.0.19
apachetomcat
7.0.20
apachetomcat
7.0.21
apachetomcat
7.0.22
apachetomcat
7.0.23
apachetomcat
7.0.25
apachetomcat
7.0.28
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat5.5
hardy
ignored
lucid
dne
oneiric
dne
precise
dne
quantal
dne
raring
dne
tomcat6
hardy
dne
lucid
Fixed 6.0.24-2ubuntu1.11
released
oneiric
Fixed 6.0.32-5ubuntu1.3
released
precise
Fixed 6.0.35-1ubuntu3.1
released
quantal
Fixed 6.0.35-5ubuntu0.1
released
raring
not-affected
tomcat7
hardy
dne
lucid
dne
oneiric
Fixed 7.0.21-1ubuntu0.1
released
precise
Fixed 7.0.26-1ubuntu1.2
released
quantal
not-affected
raring
not-affected
Common Weakness Enumeration
References