Vulnerability Description
The Tomcat 6 DIGEST authentication functionality as used in Red Hat Enterprise Linux 6 allows remote attackers to bypass intended access restrictions by performing a replay attack after a nonce becomes stale. NOTE: this issue is due to an incomplete fix for CVE-2012-5887.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2013-0869.htmlVendor Advisory
- http://www.securityfocus.com/bid/60187
- https://bugzilla.redhat.com/show_bug.cgi?id=959047Vendor Advisory
- http://rhn.redhat.com/errata/RHSA-2013-0869.htmlVendor Advisory
- http://www.securityfocus.com/bid/60187
- https://bugzilla.redhat.com/show_bug.cgi?id=959047Vendor Advisory
FAQ
What is CVE-2013-2051?
CVE-2013-2051 is a vulnerability with a CVSS score of 2.6 (LOW). The Tomcat 6 DIGEST authentication functionality as used in Red Hat Enterprise Linux 6 allows remote attackers to bypass intended access restrictions by performing a replay attack after a nonce become...
How severe is CVE-2013-2051?
CVE-2013-2051 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2051?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux.