Executive Summary
Summary | |
---|---|
Title | tomcat5 security update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:0640 | First vendor Publication | 2013-03-12 |
Vendor | RedHat | Last vendor Modification | 2013-03-12 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated tomcat5 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: Apache Tomcat is a servlet container. It was found that when an application used FORM authentication, along with another component that calls request.setUserPrincipal() before the call to FormAuthenticator#authenticate() (such as the Single-Sign-On valve), it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of a URL. A remote attacker with an authenticated session on an affected application could use this flaw to circumvent authorization controls, and thereby access resources not permitted by the roles associated with their authenticated session. (CVE-2012-3546) Multiple weaknesses were found in the Tomcat DIGEST authentication implementation, effectively reducing the security normally provided by DIGEST authentication. A remote attacker could use these flaws to perform replay attacks in some circumstances. (CVE-2012-5885, CVE-2012-5886, CVE-2012-5887) Users of Tomcat should upgrade to these updated packages, which correct these issues. Tomcat must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 873664 - CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 tomcat: three DIGEST authentication implementation issues 883634 - CVE-2012-3546 Tomcat/JBoss Web: Bypass of security constraints |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-0640.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-287 | Improper Authentication |
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17934 | |||
Oval ID: | oval:org.mitre.oval:def:17934 | ||
Title: | USN-1637-1 -- tomcat6 vulnerabilities | ||
Description: | Several security issues were fixed in Apache Tomcat. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1637-1 CVE-2012-2733 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 7 |
Platform(s): | Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18605 | |||
Oval ID: | oval:org.mitre.oval:def:18605 | ||
Title: | DSA-2725-1 tomcat6 - several | ||
Description: | Two security issues have been found in the Tomcat servlet and JSP engine: | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2725-1 CVE-2012-3544 CVE-2013-2067 CVE-2012-2733 CVE-2012-3546 CVE-2012-4431 CVE-2012-4534 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 8 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19322 | |||
Oval ID: | oval:org.mitre.oval:def:19322 | ||
Title: | HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass, Unauthorized Modification and Other Vulnerabilities | ||
Description: | The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-5885 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19432 | |||
Oval ID: | oval:org.mitre.oval:def:19432 | ||
Title: | HP-UX Running Apache, Remote Denial of Service (DoS), Execution of Arbitrary Code and other vulnerabilities | ||
Description: | The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-5885 | Version: | 11 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21075 | |||
Oval ID: | oval:org.mitre.oval:def:21075 | ||
Title: | RHSA-2013:0623: tomcat6 security update (Important) | ||
Description: | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0623-01 CESA-2013:0623 CVE-2012-3546 CVE-2012-4534 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 73 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24031 | |||
Oval ID: | oval:org.mitre.oval:def:24031 | ||
Title: | ELSA-2013:0623: tomcat6 security update (Important) | ||
Description: | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0623-01 CVE-2012-3546 CVE-2012-4534 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 25 |
Platform(s): | Oracle Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-26 | Name : Fedora Update for tomcat FEDORA-2012-20151 File : nvt/gb_fedora_2012_20151_tomcat_fc16.nasl |
2012-11-27 | Name : Apache Tomcat Multiple Security Bypass Vulnerabilities (Windows) File : nvt/gb_apache_tomcat_mult_sec_bypass_vuln_win.nasl |
2012-11-23 | Name : Ubuntu Update for tomcat6 USN-1637-1 File : nvt/gb_ubuntu_USN_1637_1.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-11-21 | IAVM : 2013-A-0219 - Multiple Vulnerabilities in Juniper Networks and Security Manager Severity : Category I - VMSKEY : V0042384 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_tomcat_20140401.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-29.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0641.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0197.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0196.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0195.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0158.nasl - Type : ACT_GATHER_INFO |
2014-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0005.nasl - Type : ACT_GATHER_INFO |
2014-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0266.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-883.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-884.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_2012_2_r5.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2725.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0869.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0640.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0623.nasl - Type : ACT_GATHER_INFO |
2013-05-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0869.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0869.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130528_tomcat6_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-03-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0647.nasl - Type : ACT_GATHER_INFO |
2013-03-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0640.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130311_tomcat6_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0623.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0640.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130312_tomcat5_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-03-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0623.nasl - Type : ACT_GATHER_INFO |
2013-03-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0629.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_tomcat6-130107.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_tomcat5-8397.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0193.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0192.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0164.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0147.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1685-1.nasl - Type : ACT_GATHER_INFO |
2012-12-20 | Name : The remote Fedora host is missing a security update. File : fedora_2012-20151.nasl - Type : ACT_GATHER_INFO |
2012-12-06 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_f599dfc43ec211e28ae1001a8056d0b5.nasl - Type : ACT_GATHER_INFO |
2012-11-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1637-1.nasl - Type : ACT_GATHER_INFO |
2012-11-21 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_7_0_30.nasl - Type : ACT_GATHER_INFO |
2012-11-21 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_6_0_36.nasl - Type : ACT_GATHER_INFO |
2012-11-21 | Name : The remote Apache Tomcat server is affected by multiple security weaknesses. File : tomcat_5_5_36.nasl - Type : ACT_GATHER_INFO |
2012-11-12 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_152e4c7e2a2e11e299c700a0d181e71d.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-08-23 09:26:30 |
|
2016-04-27 02:17:06 |
|
2014-05-09 21:29:42 |
|
2014-05-07 21:29:24 |
|
2014-05-07 13:31:35 |
|
2014-03-24 21:29:27 |
|
2014-03-08 13:27:31 |
|
2014-02-17 11:57:02 |
|
2013-12-11 17:25:09 |
|
2013-12-06 21:26:56 |
|
2013-12-05 17:25:29 |
|
2013-08-20 21:28:33 |
|
2013-06-05 13:24:43 |
|
2013-05-16 17:05:02 |
|
2013-05-11 00:53:16 |
|
2013-03-23 13:19:24 |
|
2013-03-16 18:31:56 |
|
2013-03-12 22:08:53 |
|
2013-03-12 22:06:50 |
|