MEDIUM · 5.9

CVE-2016-0762

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied...

Vulnerability Description

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.

CVSS Score

5.9

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
ApacheTomcat>= 6.0.0, <= 6.0.45
CanonicalUbuntu Linux16.04
DebianDebian Linux8.0
RedhatJboss Enterprise Web Server3.0.0
RedhatEnterprise Linux Desktop7.0
RedhatEnterprise Linux Eus7.4
RedhatEnterprise Linux Server7.0
RedhatEnterprise Linux Server Aus7.4
RedhatEnterprise Linux Server Tus7.6
RedhatEnterprise Linux Workstation7.0
NetappOncommand Insight-
NetappOncommand Shift-
NetappSnap Creator Framework-
OracleCommunications Diameter Signaling Router>= 8.0.0, <= 8.5.0
OracleTekelec Platform Distribution>= 7.4.0, <= 7.7.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-0762?

CVE-2016-0762 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied...

How severe is CVE-2016-0762?

CVE-2016-0762 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-0762?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Jboss Enterprise Web Server, Redhat Enterprise Linux Desktop.