[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-5035

Date: (C)2011-12-29   (M)2017-11-18 


Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.

CVSS Score: 5.0Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL





Reference:
http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
SECUNIA-48589
SECUNIA-48950
SECUNIA-57126
DSA-2420
GLSA-201406-32
HPSBST02955
IAVM:2012-A-0147
IAVM:2012-A-0148
IAVM:2013-A-0011
MDVSA-2013:150
RHSA-2013:1455
SSRT100779
SSRT100867
SSRT100871
VU#903934
http://www.nruns.com/_downloads/advisory28122011.pdf
http://www.ocert.org/advisories/ocert-2011-003.html
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py

CPE    3
cpe:/a:oracle:glassfish_server:3.1.1
cpe:/a:oracle:glassfish_server:3.0.1
cpe:/a:oracle:glassfish_server:2.1.1
CWE    1
CWE-20
OVAL    25
oval:org.secpod.oval:def:5215
oval:org.secpod.oval:def:103384
oval:org.secpod.oval:def:103370
oval:org.secpod.oval:def:103907
...

© 2013 SecPod Technologies