[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-5035

Date: (C)2011-12-29   (M)2017-09-19
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.

Reference:
http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
SECUNIA-48589
SECUNIA-48950
SECUNIA-57126
DSA-2420
GLSA-201406-32
HPSBST02955
IAVM:2012-A-0147
IAVM:2012-A-0148
IAVM:2013-A-0011
MDVSA-2013:150
RHSA-2013:1455
SSRT100779
SSRT100867
SSRT100871
VU#903934
http://www.nruns.com/_downloads/advisory28122011.pdf
http://www.ocert.org/advisories/ocert-2011-003.html
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py

CPE    3
cpe:/a:oracle:glassfish_server:3.1.1
cpe:/a:oracle:glassfish_server:2.1.1
cpe:/a:oracle:glassfish_server:3.0.1
CWE    1
CWE-20
OVAL    25
oval:org.secpod.oval:def:5215
oval:org.secpod.oval:def:5115
oval:org.secpod.oval:def:103384
oval:org.secpod.oval:def:103370
...

© 2013 SecPod Technologies