Lucene search

K
freebsdFreeBSD7F5CCB1D-439B-11E1-BC16-0023AE8E59F0
HistoryOct 21, 2011 - 12:00 a.m.

tomcat -- Denial of Service

2011-10-2100:00:00
vuxml.freebsd.org
31

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.059 Low

EPSS

Percentile

93.5%

The Tomcat security team reports:

Analysis of the recent hash collision vulnerability identified
unrelated inefficiencies with Apache Tomcat’s handling of large
numbers of parameters and parameter values. These inefficiencies
could allow an attacker, via a specially crafted request, to
cause large amounts of CPU to be used which in turn could create
a denial of service. The issue was addressed by modifying the
Tomcat parameter handling code to efficiently process large
numbers of parameters and parameter values.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchtomcat< 5.5.35UNKNOWN
FreeBSDanynoarchtomcat< 6.0.34UNKNOWN
FreeBSDanynoarchtomcat< 7.0.23UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.059 Low

EPSS

Percentile

93.5%