Vulnerability Description
When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat Native | >= 1.1.23, <= 1.1.34 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1040390Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0465Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0466Third Party Advisory
- https://lists.apache.org/thread.html/6eb0a53e5827d97db1a05c736d01101fec21202a5b8
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade0
- https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b7
- https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ec
- https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08
- https://lists.debian.org/debian-lts-announce/2018/02/msg00011.htmlMailing ListThird Party Advisory
- https://www.debian.org/security/2018/dsa-4118Third Party Advisory
- http://www.securitytracker.com/id/1040390Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0465Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0466Third Party Advisory
- https://lists.apache.org/thread.html/6eb0a53e5827d97db1a05c736d01101fec21202a5b8
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade0
FAQ
What is CVE-2017-15698?
CVE-2017-15698 is a vulnerability with a CVSS score of 5.9 (MEDIUM). When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of t...
How severe is CVE-2017-15698?
CVE-2017-15698 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15698?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat Native, Debian Debian Linux.