When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.
[
{
"product": "Apache Tomcat Native",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "1.2.0 to 1.2.16"
},
{
"status": "affected",
"version": "1.1.23 to 1.1.34"
}
]
}
]
mail-archives.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180721095943.GA24320%40minotaur.apache.org%3E
www.securityfocus.com/bid/104936
www.securitytracker.com/id/1041507
access.redhat.com/errata/RHSA-2018:2469
access.redhat.com/errata/RHSA-2018:2470
lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
lists.debian.org/debian-lts-announce/2018/08/msg00023.html