CVE-2016-0762
Public on 2016-11-10
Modified on 2016-11-10
Description
The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
HAQM Linux 1 | tomcat6 | 2016-11-10 | ALAS-2016-764 | Fixed |
HAQM Linux 1 | tomcat7 | 2016-11-10 | ALAS-2016-764 | Fixed |
HAQM Linux 1 | tomcat8 | 2016-11-10 | ALAS-2016-764 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
HAQM Linux | CVSSv2 | 2.6 | AV:N/AC:H/Au:N/C:P/I:N/A:N |
HAQM Linux | CVSSv3 | 3.7 | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
NVD | CVSSv2 | 4.3 | AV:N/AC:M/Au:N/C:P/I:N/A:N |
NVD | CVSSv3 | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |