First published: Sat Jan 14 2012(Updated: )
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.12 | 7.0.12 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.33 | 6.0.33 |
maven/org.apache.tomcat:tomcat | >=5.5.0<5.5.34 | 5.5.34 |
Tomcat | =5.5.0 | |
Tomcat | =5.5.1 | |
Tomcat | =5.5.2 | |
Tomcat | =5.5.3 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.5 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.11 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.13 | |
Tomcat | =5.5.14 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.16 | |
Tomcat | =5.5.17 | |
Tomcat | =5.5.18 | |
Tomcat | =5.5.19 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.21 | |
Tomcat | =5.5.22 | |
Tomcat | =5.5.23 | |
Tomcat | =5.5.24 | |
Tomcat | =5.5.25 | |
Tomcat | =5.5.26 | |
Tomcat | =5.5.27 | |
Tomcat | =5.5.28 | |
Tomcat | =5.5.29 | |
Tomcat | =5.5.30 | |
Tomcat | =5.5.31 | |
Tomcat | =5.5.32 | |
Tomcat | =5.5.33 | |
Tomcat | =6.0 | |
Tomcat | =6.0.0 | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 | |
Tomcat | =6.0.14 | |
Tomcat | =6.0.15 | |
Tomcat | =6.0.16 | |
Tomcat | =6.0.17 | |
Tomcat | =6.0.18 | |
Tomcat | =6.0.19 | |
Tomcat | =6.0.20 | |
Tomcat | =6.0.24 | |
Tomcat | =6.0.26 | |
Tomcat | =6.0.27 | |
Tomcat | =6.0.28 | |
Tomcat | =6.0.29 | |
Tomcat | =6.0.30 | |
Tomcat | =6.0.31 | |
Tomcat | =6.0.32 | |
Tomcat | =7.0.0 | |
Tomcat | =7.0.0-beta | |
Tomcat | =7.0.1 | |
Tomcat | =7.0.2 | |
Tomcat | =7.0.3 | |
Tomcat | =7.0.4 | |
Tomcat | =7.0.5 | |
Tomcat | =7.0.6 | |
Tomcat | =7.0.7 | |
Tomcat | =7.0.8 | |
Tomcat | =7.0.9 | |
Tomcat | =7.0.10 | |
Tomcat | =7.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5062 has a moderate severity rating that allows potential integrity protection bypass.
To remediate CVE-2011-5062, upgrade to Apache Tomcat version 5.5.34, 6.0.33, or 7.0.12 or later.
CVE-2011-5062 affects Apache Tomcat versions 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12.
CVE-2011-5062 is an authentication-related vulnerability related to improper handling of qop values.
Yes, CVE-2011-5062 can be exploited remotely, enabling attackers to bypass intended integrity-protection requirements.