Summary: | <www-servers/tomcat-{6.0.35,7.0.23} Hash Algorithm Collision DoS (CVE-2011-4858,CVE-2012-0022) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Michael Harrison <n0idx80> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.ocert.org/advisories/ocert-2011-003.html | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 395923, 395933, 409609, 414375 | ||
Bug Blocks: | 396397 |
Description
Michael Harrison
2011-12-29 11:27:55 UTC
I think the previous CVE listed here may be incorrect; I don't see it listed anywhere on https://tomcat.apache.org/security-6.html. CVE-2012-0022 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0022): Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. CVE-2011-4858 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4858): Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. Thanks, folks. GLSA Vote: yes. GLSA vote: yes. Added to existing GLSA request. This issue was resolved and addressed in GLSA 201206-24 at http://security.gentoo.org/glsa/glsa-201206-24.xml by GLSA coordinator Tobias Heinlein (keytoaster). |