CVE-2016-0762

CWE-20316 documents9 sources
Severity
5.9MEDIUM
EPSS
0.5%
top 33.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 10
Latest updateMay 13

Description

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages12 packages

Mavenorg.apache.tomcat:tomcat9.0.0M19.0.0.M10+4
NVDapache/tomcat6.0.06.0.45+4
Ubuntutomcat6< 6.0.39-1ubuntu0.1+1
Ubuntutomcat7< 7.0.52-1ubuntu0.8+1

Also affects: Debian Linux 8.0, Ubuntu Linux 16.04, Enterprise Linux 7.4, 7.5, 7.6, 7.7

Patches

🔴Vulnerability Details

7
OSV
Observable Discrepancy in Apache Tomcat2022-05-13
GHSA
Observable Discrepancy in Apache Tomcat2022-05-13
OSV
tomcat6 vulnerabilities2020-09-30
CVEList
CVE-2016-0762: The Realm implementations in Apache Tomcat versions 92017-08-10
OSV
tomcat6, tomcat7 regression2017-02-02

📋Vendor Advisories

5
Oracle
Oracle Oracle Communications Risk Matrix: Provisioning (Apache Tomcat) — CVE-2016-07622021-07-15
Ubuntu
Tomcat vulnerabilities2020-09-30
Ubuntu
Tomcat vulnerabilities2017-01-23
Red Hat
tomcat: timing attack in Realm implementation2016-10-27
Apache
Apache tomcat: CVE-2016-0762

💬Community

3
Bugzilla
CVE-2016-0762 CVE-2016-5018 CVE-2016-6794 CVE-2016-6796 CVE-2016-6797 tomcat: various flaws [epel-6]2016-11-01
Bugzilla
CVE-2016-0762 tomcat: timing attack in Realm implementation2016-11-01
Bugzilla
CVE-2016-0762 CVE-2016-5018 CVE-2016-6794 CVE-2016-6796 CVE-2016-6797 tomcat: various flaws [fedora-all]2016-11-01