Описание
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | tomcat6 | Not affected | ||
Red Hat JBoss BRMS 5 | jbossweb | Not affected | ||
Red Hat JBoss Data Grid 6 | jbossweb | Not affected | ||
Red Hat JBoss Enterprise Web Server 2 | tomcat7 | Not affected | ||
Red Hat JBoss Operations Network 3.1 | jbossweb | Not affected | ||
Red Hat JBoss Portal 5 | jbossweb | Not affected | ||
Red Hat JBoss SOA Platform 5 | jbossweb | Not affected | ||
Red Hat JBoss Enterprise Web Server 2 for RHEL 5 | tomcat6 | Fixed | RHSA-2013:0266 | 19.02.2013 |
Red Hat JBoss Enterprise Web Server 2 for RHEL 6 | tomcat6 | Fixed | RHSA-2013:0266 | 19.02.2013 |
Red Hat JBoss Web Server 2.0 | Fixed | RHSA-2013:0265 | 19.02.2013 |
Показывать по
Дополнительная информация
Статус:
EPSS
5 Medium
CVSS2
Связанные уязвимости
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP ...
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
EPSS
5 Medium
CVSS2