5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
5.6 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
55.5%
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html
lists.opensuse.org/opensuse-security-announce/2012-02/msg00006.html
marc.info/?l=bugtraq&m=139344343412337&w=2
rhn.redhat.com/errata/RHSA-2012-0074.html
rhn.redhat.com/errata/RHSA-2012-0075.html
rhn.redhat.com/errata/RHSA-2012-0076.html
rhn.redhat.com/errata/RHSA-2012-0077.html
rhn.redhat.com/errata/RHSA-2012-0078.html
rhn.redhat.com/errata/RHSA-2012-0325.html
secunia.com/advisories/57126
svn.apache.org/viewvc?view=rev&rev=1087655
svn.apache.org/viewvc?view=rev&rev=1158180
svn.apache.org/viewvc?view=rev&rev=1159309
tomcat.apache.org/security-5.html
tomcat.apache.org/security-6.html
tomcat.apache.org/security-7.html
www.debian.org/security/2012/dsa-2401
www.redhat.com/support/errata/RHSA-2011-1845.html
lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E