CVE-2017-15698
tomcat-native: Mishandling of client certificates can allow for OCSP check bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.
Al analizar el campo AIA-Extension de un certificado de cliente, Apache Tomcat Native Connector en versiones 1.2.0 a 1.2.14 y 1.1.23 a 1.1.34 no gestionó correctamente los campos superiores a los 127 bytes. El resultado del error de análisis fue la omisión de la comprobación OCSP. Por lo tanto, era posible que se aceptasen certificados de cliente que deberían haber sido rechazados (si se hubiese realizado la comprobación OCSP). Los usuarios que no empleen las comprobaciones OCSP no se han visto afectados por la vulnerabilidad.
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector, JBoss HTTP Connector, Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 2 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Multiple security issues have been addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-10-21 CVE Reserved
- 2018-01-31 CVE Published
- 2024-09-16 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-295: Improper Certificate Validation
- CWE-299: Improper Check for Certificate Revocation
CAPEC
References (12)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:0465 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:0466 | 2023-11-07 | |
https://www.debian.org/security/2018/dsa-4118 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2017-15698 | 2018-03-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1540824 | 2018-03-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Tomcat Native Search vendor "Apache" for product "Tomcat Native" | >= 1.1.23 <= 1.1.34 Search vendor "Apache" for product "Tomcat Native" and version " >= 1.1.23 <= 1.1.34" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Tomcat Native Search vendor "Apache" for product "Tomcat Native" | >= 1.2.0 <= 1.2.14 Search vendor "Apache" for product "Tomcat Native" and version " >= 1.2.0 <= 1.2.14" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|