Описание
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Certificate System 7.3 | Tomcat | Will not fix | ||
Red Hat Developer Suite v.3 | Platform | Will not fix | ||
Red Hat Satellite 5.4 | tomcat5 | Not affected | ||
JBEWP 5 for RHEL 5 | jbossweb | Fixed | RHSA-2012:0076 | 31.01.2012 |
JBEWP 5 for RHEL 6 | jbossweb | Fixed | RHSA-2012:0076 | 31.01.2012 |
JBoss Communications Platform 5.1 | Fixed | RHSA-2012:0078 | 31.01.2012 | |
JBoss Enterprise BRMS Platform 5.1 | Fixed | RHSA-2012:0325 | 22.02.2012 | |
Red Hat Enterprise Linux 5 | tomcat5 | Fixed | RHSA-2012:0474 | 11.04.2012 |
Red Hat Enterprise Linux 6 | tomcat6 | Fixed | RHSA-2012:0475 | 11.04.2012 |
Red Hat JBoss Enterprise Application Platform 4.3 | Fixed | RHSA-2012:0041 | 19.01.2012 |
Показывать по
Дополнительная информация
Статус:
EPSS
5 Medium
CVSS2
Связанные уязвимости
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 ...
EPSS
5 Medium
CVSS2