![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5885 – tomcat: three DIGEST authentication implementation issues
https://notcve.org/view.php?id=CVE-2012-5885
17 Nov 2012 — The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184. La funcionalidad replay-countermeasure en Apache Tomcat ... • http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5886 – tomcat: three DIGEST authentication implementation issues
https://notcve.org/view.php?id=CVE-2012-5886
17 Nov 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID. La implementación de HTTP Digest Access Authentication en Apache Tomcat v5.5.x antes de v5.5.36, 6.x antes 6.0.36, v7.x antes de v7.0.30 cachés información sobre el usuario autenticado en el estado d... • http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html • CWE-287: Improper Authentication •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5887 – tomcat: three DIGEST authentication implementation issues
https://notcve.org/view.php?id=CVE-2012-5887
17 Nov 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests. La implementación de HTTP Digest Access Authentication en Apache Tomcat v5.5.x antes de v5.5.36, v6.x antes de v6.0.36, v7.x antes de v7.0.30 no comprue... • http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html • CWE-287: Improper Authentication •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-2733 – tomcat: HTTP NIO connector OOM DoS via a request with large headers
https://notcve.org/view.php?id=CVE-2012-2733
16 Nov 2012 — java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data. java/org/apache/coyote/http11/InternalNioInputBuffer.java en el conector HTTP NIO en Apache Tomcat v6.x antes de v6.0.36 y v7.x antes de V7.0.28 no restringe correctamente el tamaño de la petición de cabe... • http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html • CWE-20: Improper Input Validation •