lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <E1TtIEi-0006nk-QV@titan.mandriva.com>
Date: Thu, 10 Jan 2013 14:32:00 +0100
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2013:004 ] tomcat5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:004
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : tomcat5
 Date    : January 10, 2013
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilites has been found and corrected in tomcat5:
 
 The replay-countermeasure functionality in the HTTP Digest Access
 Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x
 before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce)
 values instead of nonce (aka server nonce) and nc (aka nonce-count)
 values, which makes it easier for remote attackers to bypass intended
 access restrictions by sniffing the network for valid requests,
 a different vulnerability than CVE-2011-1184 (CVE-2012-5885).
 
 The HTTP Digest Access Authentication implementation in Apache Tomcat
 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches
 information about the authenticated user within the session state,
 which makes it easier for remote attackers to bypass authentication
 via vectors related to the session ID (CVE-2012-5886).
 
 The HTTP Digest Access Authentication implementation in Apache Tomcat
 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not
 properly check for stale nonce values in conjunction with enforcement
 of proper credentials, which makes it easier for remote attackers
 to bypass intended access restrictions by sniffing the network for
 valid requests (CVE-2012-5887).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887
 http://tomcat.apache.org/security-5.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 935ea1aaf1d25f4456ba83ce99db63bc  mes5/i586/tomcat5-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 9844570f107eb192c8f2ea58192bb347  mes5/i586/tomcat5-admin-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fd9368b9caf993e85d72b97fa53a6ca6  mes5/i586/tomcat5-common-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fca1d2dcaf9a512652ae60d24ef611ee  mes5/i586/tomcat5-jasper-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 6ed9a7677dd8e0d4e71aa3a7d9b2b885  mes5/i586/tomcat5-jasper-eclipse-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 7e879ad00c1c2c590782a09a68cd7b70  mes5/i586/tomcat5-jasper-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 25c982ceb5a544c8aae91c9cceb4caf0  mes5/i586/tomcat5-jsp-2.0-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 6f20f6d3f60ff3eb6b133515e9541b3e  mes5/i586/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fb80972b920d7b6b25b2d4e962a9d2ac  mes5/i586/tomcat5-server-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 8b74bd76be82d12738e5b588d8df1cff  mes5/i586/tomcat5-servlet-2.4-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 e511972010d64177d2ba7ed454e8947e  mes5/i586/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fce151e02613993c6ff149cbb82400fd  mes5/i586/tomcat5-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm 
 d1175cae7e2aec4e9383144d3aa8ea84  mes5/SRPMS/tomcat5-5.5.28-0.5.0.5mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 d38d7f51ae6f7e64807856b862c40b75  mes5/x86_64/tomcat5-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 f7d63f858748a708c10acd8546b02b05  mes5/x86_64/tomcat5-admin-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 ca98317313a6ffff9123f77c5001e3d6  mes5/x86_64/tomcat5-common-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 e2be9cad2d7ed9d7af3845c2d0aa55f9  mes5/x86_64/tomcat5-jasper-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 19627cae9df7af23408d42a439089c59  mes5/x86_64/tomcat5-jasper-eclipse-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 8a901bd98ebab0d2cdecf5d1e92f524a  mes5/x86_64/tomcat5-jasper-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 748e8d22caa1cca056f9dda523e64e62  mes5/x86_64/tomcat5-jsp-2.0-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 229b57db6d6664b53407b1b9a3995319  mes5/x86_64/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 fd8bc83d41aa6ddabbb1097a9157c8e8  mes5/x86_64/tomcat5-server-lib-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 76ff8939382f1200a918b39677cd1de1  mes5/x86_64/tomcat5-servlet-2.4-api-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 5cb677220b4d423041c17aace76d31bd  mes5/x86_64/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm
 4d87e7273290e1bbaa04903c31d00b24  mes5/x86_64/tomcat5-webapps-5.5.28-0.5.0.5mdvmes5.2.noarch.rpm 
 d1175cae7e2aec4e9383144d3aa8ea84  mes5/SRPMS/tomcat5-5.5.28-0.5.0.5mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQ7pc2mqjQ0CJFipgRAi3/AKDm/HK6n5nrIKtfYEFFid4zzd4cVgCgwI6b
ocwOUtXQ9Wi71R4s67X4boM=
=Kmvo
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ