LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2013:004: tomcat5 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Multiple vulnerabilites has been found and corrected in tomcat5: The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:004
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : tomcat5
 Date    : January 10, 2013
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilites has been found and corrected in tomcat5:
 
 The replay-countermeasure functionality in the HTTP Digest Access
 Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x
 before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce)
 values instead of nonce (aka server nonce) and nc (aka nonce-count)
 values, which makes it easier for remote attackers to bypass intended
 access restrictions by sniffing the network for valid requests,
 a different vulnerability than CVE-2011-1184 (CVE-2012-5885).
 
 The HTTP Digest Access Authentication implementation in Apache Tomcat
 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches
 information about the authenticated user within the session state,
 which makes it easier for remote attackers to bypass authentication
 via vectors related to the session ID (CVE-2012-5886).
 
 The HTTP Digest Access Authentication implementation in Apache Tomcat
 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not
 properly check for stale nonce values in conjunction with enforcement
 of proper credentials, which makes it easier for remote attackers
 to bypass intended access restrictions by sniffing the network for
 valid requests (CVE-2012-5887).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887
 http://tomcat.apache.org/security-5.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 935ea1aaf1d25f4456ba83ce99db63bc  mes5/i586/tomcat5-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 9844570f107eb192c8f2ea58192bb347  mes5/i586/tomcat5-admin-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fd9368b9caf993e85d72b97fa53a6ca6  mes5/i586/tomcat5-common-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fca1d2dcaf9a512652ae60d24ef611ee  mes5/i586/tomcat5-jasper-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 6ed9a7677dd8e0d4e71aa3a7d9b2b885  mes5/i586/tomcat5-jasper-eclipse-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 7e879ad00c1c2c590782a09a68cd7b70  mes5/i586/tomcat5-jasper-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 25c982ceb5a544c8aae91c9cceb4caf0  mes5/i586/tomcat5-jsp-2.0-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 6f20f6d3f60ff3eb6b133515e9541b3e  mes5/i586/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fb80972b920d7b6b25b2d4e962a9d2ac  mes5/i586/tomcat5-server-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 8b74bd76be82d12738e5b588d8df1cff  mes5/i586/tomcat5-servlet-2.4-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 e511972010d64177d2ba7ed454e8947e  mes5/i586/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fce151e02613993c6ff149cbb82400fd  mes5/i586/tomcat5-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm 
 d1175cae7e2aec4e9383144d3aa8ea84  mes5/SRPMS/tomcat5-5.5.28-0.5.0.5mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 d38d7f51ae6f7e64807856b862c40b75  mes5/x86_64/tomcat5-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 f7d63f858748a708c10acd8546b02b05  mes5/x86_64/tomcat5-admin-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 ca98317313a6ffff9123f77c5001e3d6  mes5/x86_64/tomcat5-common-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 e2be9cad2d7ed9d7af3845c2d0aa55f9  mes5/x86_64/tomcat5-jasper-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 19627cae9df7af23408d42a439089c59  mes5/x86_64/tomcat5-jasper-eclipse-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 8a901bd98ebab0d2cdecf5d1e92f524a  mes5/x86_64/tomcat5-jasper-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 748e8d22caa1cca056f9dda523e64e62  mes5/x86_64/tomcat5-jsp-2.0-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 229b57db6d6664b53407b1b9a3995319  mes5/x86_64/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fd8bc83d41aa6ddabbb1097a9157c8e8  mes5/x86_64/tomcat5-server-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 76ff8939382f1200a918b39677cd1de1  mes5/x86_64/tomcat5-servlet-2.4-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 5cb677220b4d423041c17aace76d31bd  mes5/x86_64/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 4d87e7273290e1bbaa04903c31d00b24  mes5/x86_64/tomcat5-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm 
 d1175cae7e2aec4e9383144d3aa8ea84  mes5/SRPMS/tomcat5-5.5.28-0.5.0.5mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Anti-surveillance advocates want you to run an open, secure WiFi router
Attackers raid SWISS BANKS with DNS and malware bombs
A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying
Black Hat presentation on TOR suddenly cancelled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.