CVE-2016-0762

NameCVE-2016-0762
DescriptionThe Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-728-1, DLA-729-1, DSA-3720-1, DSA-3721-1
Debian Bugs842662

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat6 (PTS)jessie, jessie (lts)6.0.45+dfsg-1~deb8u1fixed
tomcat7 (PTS)jessie, jessie (lts)7.0.56-3+really7.0.109-1+deb8u6fixed
stretch7.0.75-1fixed
tomcat8 (PTS)jessie, jessie (lts)8.0.14-1+deb8u28fixed
stretch (security)8.5.54-0+deb9u8fixed
stretch (lts), stretch8.5.54-0+deb9u15fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat6sourcewheezy6.0.45+dfsg-1~deb7u3DLA-728-1
tomcat6source(unstable)6.0.41-3low
tomcat7sourcewheezy7.0.28-4+deb7u7DLA-729-1
tomcat7sourcejessie7.0.56-3+deb8u5DSA-3721-1
tomcat7source(unstable)7.0.72-1low842662
tomcat8sourcejessie8.0.14-1+deb8u4DSA-3720-1
tomcat8source(unstable)8.0.37-1low

Notes

Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie
http://markmail.org/message/pzuk6hauzljnm4r7?q=list:org.apache.tomcat.announce/
Fixed by: http://svn.apache.org/r1758501 (8.0.x)
Fixed by: http://svn.apache.org/r1758502 (7.0.x)
Fixed by: https://svn.apache.org/viewvc?view=revision&revision=1758506 (6.0.x)

Search for package or bug name: Reporting problems