[SECURITY] CVE-2018-8020 Apache Tomcat Native Connector - Mishandled OCSP responses can allow clients to authenticate with revoked certificates

2018-07-21 Thread Jean-Frederic Clere
CVE-2018-8020 Apache Tomcat Native Connector - Mishandled OCSP responses can 
allow clients to authenticate with revoked certificates

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat Native 1.2.0 to 1.2.16
Apache Tomcat Native 1.1.23 to 1.1.34

Description:
Apache Tomcat Native has a flaw that does not properly check OCSP pre-produced
responses, which are lists (multiple entries) of certificate statuses.
Subsequently, revoked client certificates may not be properly identified,
allowing for users to authenticate with revoked certicates to connections that
require mutual TLS.
Users not using OCSP checks are not affected by this vulnerability.

Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 1.2.17 or later
  Note: This version was included in Apache Tomcat 9.0.10 onwards, 8.5.32
onwards, 8.0.53 onwards and 7.0.90 onwards.

History:
2018-03-09 Original advisory

References:
[1] http://tomcat.apache.org/security-native.html

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



[SECURITY] CVE-2018-8019 Apache Tomcat Native Connector - Mishandled OCSP invalid response

2018-07-21 Thread Jean-Frederic Clere
CVE-2018-8019 Apache Tomcat Native Connector - Mishandled OCSP invalid response

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat Native 1.2.0 to 1.2.16
Apache Tomcat Native 1.1.23 to 1.1.34

Description:
When using an OCSP responder Tomcat Native did not correctly handle invalid 
responses. This allowed for revoked client certificates to be incorrectly 
identified. It was therefore possible for users to authenticate with revoked 
certificates when using mutual TLS.
Users not using OCSP checks are not affected by this vulnerability.

Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 1.2.17 or later
  Note: This version was included in Apache Tomcat 9.0.10 onwards, 8.5.32
onwards, 8.0.53 onwards and 7.0.90 onwards.

History:
2018-03-09 Original advisory

References:
[1] http://tomcat.apache.org/security-native.html

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org