Lucene search

K
tomcatApache TomcatTOMCAT:86F4A891B6EAC74A73C41E9C1370EA3F
HistoryOct 10, 2012 - 12:00 a.m.

Fixed in Apache Tomcat 5.5.36

2012-10-1000:00:00
Apache Tomcat
tomcat.apache.org
17

Moderate: DIGEST authentication weakness CVE-2012-3439

Three weaknesses in Tomcatโ€™s implementation of DIGEST authentication were identified and resolved:

  1. Tomcat tracked client rather than server nonces and nonce count.
  2. When a session ID was present, authentication was bypassed.
  3. The user name and password were not checked before when indicating that a nonce was stale.

These issues reduced the security of DIGEST authentication making replay attacks possible in some circumstances.

This was fixed in revision 1392248.

The first issue was reported by Tilmann Kuhn to the Tomcat security team on 19 July 2012. The second and third issues were discovered by the Tomcat security team during the resulting code review. All three issues were made public on 5 November 2012.

Affects: 5.5.0-5.5.35

CPENameOperatorVersion
apache tomcatge5.5.0
apache tomcatle5.5.35