First published: Tue Nov 01 2016(Updated: )
Last updated 24 July 2024
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tomcat6 | ||
redhat/tomcat | <6.0.47 | 6.0.47 |
redhat/tomcat | <7.0.72 | 7.0.72 |
redhat/tomcat | <8.5.5 | 8.5.5 |
redhat/tomcat | <8.0.37 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=6.0.0<=6.0.45 | 6.0.46 |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.72 | 7.0.72 |
maven/org.apache.tomcat:tomcat | >=8.0.0.RC1<=8.0.36 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=8.5.0<=8.5.4 | 8.5.5 |
maven/org.apache.tomcat:tomcat | >=9.0.0M1<=9.0.0.M9 | 9.0.0.M10 |
Apache Tomcat | >=6.0.0<=6.0.45 | |
Apache Tomcat | >=7.0.0<=7.0.70 | |
Apache Tomcat | >=8.0<=8.0.36 | |
Apache Tomcat | >=8.5.0<=8.5.4 | |
Apache Tomcat | =9.0.0-milestone1 | |
Apache Tomcat | =9.0.0-milestone2 | |
Apache Tomcat | =9.0.0-milestone3 | |
Apache Tomcat | =9.0.0-milestone4 | |
Apache Tomcat | =9.0.0-milestone5 | |
Apache Tomcat | =9.0.0-milestone6 | |
Apache Tomcat | =9.0.0-milestone7 | |
Apache Tomcat | =9.0.0-milestone8 | |
Apache Tomcat | =9.0.0-milestone9 | |
Ubuntu | =16.04 | |
Debian | =8.0 | |
Red Hat JBoss Enterprise Web Server | =3.0.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Shift | ||
NetApp Snap Creator Framework | ||
Oracle Communications Diameter Signaling Router | >=8.0.0<=8.5.0 | |
Oracle Tekelec Platform Distribution | >=7.4.0<=7.7.1 | |
Apache Tomcat | =9.0.0-m1 | |
Apache Tomcat | =9.0.0-m2 | |
Apache Tomcat | =9.0.0-m3 | |
Apache Tomcat | =9.0.0-m4 | |
Apache Tomcat | =9.0.0-m5 | |
Apache Tomcat | =9.0.0-m6 | |
Apache Tomcat | =9.0.0-m7 | |
Apache Tomcat | =9.0.0-m8 | |
Apache Tomcat | =9.0.0-m9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0762 is classified as a medium severity vulnerability due to its potential for timing attacks to disclose valid usernames.
To fix CVE-2016-0762, upgrade to Apache Tomcat versions 6.0.47, 7.0.72, 8.0.37, 8.5.5, or later.
CVE-2016-0762 affects multiple versions of Apache Tomcat, including versions 6.x, 7.x, 8.x, and 9.0.0-milestone releases.
CVE-2016-0762 is a timing attack vulnerability affecting the authentication process in Apache Tomcat's Realm implementations.
There are no specific workarounds for CVE-2016-0762, but upgrading to a patched version is the recommended mitigation.