First published: Sat Nov 17 2012(Updated: )
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat | =5.5.0 | |
Tomcat | =5.5.1 | |
Tomcat | =5.5.2 | |
Tomcat | =5.5.3 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.5 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.11 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.13 | |
Tomcat | =5.5.14 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.16 | |
Tomcat | =5.5.17 | |
Tomcat | =5.5.18 | |
Tomcat | =5.5.19 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.21 | |
Tomcat | =5.5.22 | |
Tomcat | =5.5.23 | |
Tomcat | =5.5.24 | |
Tomcat | =5.5.25 | |
Tomcat | =5.5.26 | |
Tomcat | =5.5.27 | |
Tomcat | =5.5.28 | |
Tomcat | =5.5.29 | |
Tomcat | =5.5.30 | |
Tomcat | =5.5.31 | |
Tomcat | =5.5.32 | |
Tomcat | =5.5.33 | |
Tomcat | =5.5.34 | |
Tomcat | =5.5.35 | |
Tomcat | =6.0 | |
Tomcat | =6.0.0 | |
Tomcat | =6.0.0-alpha | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.1-alpha | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.2-alpha | |
Tomcat | =6.0.2-beta | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.4-alpha | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.6-alpha | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.7-alpha | |
Tomcat | =6.0.7-beta | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.8-alpha | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.9-beta | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 | |
Tomcat | =6.0.14 | |
Tomcat | =6.0.15 | |
Tomcat | =6.0.16 | |
Tomcat | =6.0.17 | |
Tomcat | =6.0.18 | |
Tomcat | =6.0.19 | |
Tomcat | =6.0.20 | |
Tomcat | =6.0.24 | |
Tomcat | =6.0.26 | |
Tomcat | =6.0.27 | |
Tomcat | =6.0.28 | |
Tomcat | =6.0.29 | |
Tomcat | =6.0.30 | |
Tomcat | =6.0.31 | |
Tomcat | =6.0.32 | |
Tomcat | =6.0.33 | |
Tomcat | =6.0.35 | |
Tomcat | =7.0.0 | |
Tomcat | =7.0.0-beta | |
Tomcat | =7.0.1 | |
Tomcat | =7.0.2 | |
Tomcat | =7.0.2-beta | |
Tomcat | =7.0.3 | |
Tomcat | =7.0.4 | |
Tomcat | =7.0.4-beta | |
Tomcat | =7.0.5 | |
Tomcat | =7.0.6 | |
Tomcat | =7.0.7 | |
Tomcat | =7.0.8 | |
Tomcat | =7.0.9 | |
Tomcat | =7.0.10 | |
Tomcat | =7.0.11 | |
Tomcat | =7.0.12 | |
Tomcat | =7.0.13 | |
Tomcat | =7.0.14 | |
Tomcat | =7.0.15 | |
Tomcat | =7.0.16 | |
Tomcat | =7.0.17 | |
Tomcat | =7.0.18 | |
Tomcat | =7.0.19 | |
Tomcat | =7.0.20 | |
Tomcat | =7.0.21 | |
Tomcat | =7.0.22 | |
Tomcat | =7.0.23 | |
Tomcat | =7.0.25 | |
Tomcat | =7.0.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5887 is considered a medium severity vulnerability as it allows attackers to bypass authentication controls.
To fix CVE-2012-5887, upgrade Apache Tomcat to version 5.5.36, 6.0.36, or 7.0.30 or later.
CVE-2012-5887 affects Apache Tomcat versions 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30.
Yes, attackers can exploit CVE-2012-5887 remotely by manipulating HTTP Digest Access Authentication.
The best workaround for CVE-2012-5887 is to upgrade to a fixed version, as no other specific mitigations are provided.