When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability. Versions Affected: Apache Tomcat Native 1.2.0 to 1.2.14 Apache Tomcat Native 1.1.23 to 1.1.34 Upstream Advisory: http://tomcat.10.x6.nabble.com/SECURITY-CVE-2017-15698-Apache-Tomcat-Native-Connector-OCSP-check-omitted-td5071564.html Upstream Patches: http://svn.apache.org/viewvc?view=revision&revision=1815200 http://svn.apache.org/viewvc?view=revision&revision=1815218
Created tomcat-native tracking bugs for this issue: Affects: epel-all [bug 1540827] Affects: fedora-all [bug 1540826]
This issue has been addressed in the following products: Red Hat JBoss Web Server Via RHSA-2018:0465 https://access.redhat.com/errata/RHSA-2018:0465
This issue has been addressed in the following products: Red Hat JBoss Web Server 3 for RHEL 6 Red Hat JBoss Web Server 3 for RHEL 7 Via RHSA-2018:0466 https://access.redhat.com/errata/RHSA-2018:0466
This vulnerability is out of security support scope for the following product: * Red Hat JBoss Web Server 3 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-15698