Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-2739

Опубликовано: 28 нояб. 2012
Источник: debian
EPSS Низкий

Описание

Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjdk-6removedpackage
openjdk-7removedpackage

Примечания

  • Upstream disputes this and states it needs to be fixed in Java apps itself

  • http://mail.openjdk.java.net/pipermail/core-libs-dev/2012-May/010238.html

  • http://armoredbarista.blogspot.de/2012/02/investigating-hashdos-issue.html

  • https://www.openwall.com/lists/oss-security/2012/06/15/12

  • https://www.openwall.com/lists/oss-security/2012/06/17/1

EPSS

Процентиль: 76%
0.00936
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

redhat
около 14 лет назад

Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

nvd
около 13 лет назад

Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

github
больше 3 лет назад

Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

EPSS

Процентиль: 76%
0.00936
Низкий