[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2018-965

ID: oval:org.secpod.oval:def:1600851Date: (C)2018-03-12   (M)2023-11-10
Class: PATCHFamily: unix




Mishandling of client certificates can allow for OCSP check bypass:When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected to be accepted. Users not using OCSP checks are not affected by this vulnerability

Platform:
Amazon Linux AMI
Product:
tomcat-native
Reference:
ALAS-2018-965
CVE-2017-15698
CVE    1
CVE-2017-15698
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:tomcat-native

© SecPod Technologies