CVE-2016-0762
Publication date 28 October 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
Status
Package | Ubuntu Release | Status |
---|---|---|
tomcat6 | 20.04 LTS focal | Not in release |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Fixed 6.0.45+dfsg-1ubuntu0.1
|
|
14.04 LTS trusty |
Fixed 6.0.39-1ubuntu0.1
|
|
tomcat7 | 20.04 LTS focal | Not in release |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Fixed 7.0.68-1ubuntu0.3
|
|
14.04 LTS trusty |
Not affected
|
|
tomcat8 | 20.04 LTS focal | Not in release |
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Fixed 8.0.32-1ubuntu1.3
|
|
14.04 LTS trusty | Not in release | |
Notes
Patch details
Package | Patch details |
---|---|
tomcat6 | |
tomcat7 | |
tomcat8 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3177-1
- Tomcat vulnerabilities
- 23 January 2017
- USN-4557-1
- Tomcat vulnerabilities
- 30 September 2020