9.8

CVE-2018-1312

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheHTTP Server Version2.4.1
ApacheHTTP Server Version2.4.2
ApacheHTTP Server Version2.4.3
ApacheHTTP Server Version2.4.4
ApacheHTTP Server Version2.4.6
ApacheHTTP Server Version2.4.7
ApacheHTTP Server Version2.4.9
ApacheHTTP Server Version2.4.10
ApacheHTTP Server Version2.4.12
ApacheHTTP Server Version2.4.16
ApacheHTTP Server Version2.4.17
ApacheHTTP Server Version2.4.18
ApacheHTTP Server Version2.4.20
ApacheHTTP Server Version2.4.23
ApacheHTTP Server Version2.4.25
ApacheHTTP Server Version2.4.26
ApacheHTTP Server Version2.4.27
ApacheHTTP Server Version2.4.28
ApacheHTTP Server Version2.4.29
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version17.10
CanonicalUbuntu Linux Version18.04 SwEditionlts
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
NetappCloud Backup Version-
NetappStoragegrid Version-
RedhatJboss Core Services Version1.0
   RedhatEnterprise Linux Version6.0
   RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Eus Version7.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 9.08% 0.923
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

https://usn.ubuntu.com/3627-1/
Third Party Advisory
https://usn.ubuntu.com/3627-2/
Third Party Advisory
https://usn.ubuntu.com/3937-2/
Third Party Advisory
http://www.securityfocus.com/bid/103524
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040571
Third Party Advisory
Broken Link
VDB Entry