[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-0022

Date: (C)2012-01-18   (M)2017-09-22
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

Reference:
http://archives.neohapsis.com/archives/bugtraq/2012-01/0112.html
SECUNIA-48213
SECUNIA-48790
SECUNIA-48791
SECUNIA-50863
BID-51447
DSA-2401
HPSBUX02741
HPSBUX02860
IAVM:2012-B-0035
IAVM:2013-A-0011
IAVM:2013-A-0219
MDVSA-2013:150
RHSA-2012:0074
RHSA-2012:0075
RHSA-2012:0076
RHSA-2012:0077
RHSA-2012:0078
RHSA-2012:0325
RHSA-2012:0345
RHSA-2012:1331
SSRT101146
apache-tomcat-parameter-dos(72425)
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html

CPE    90
cpe:/a:apache:tomcat:5.5.28
cpe:/a:apache:tomcat:5.5.29
cpe:/a:apache:tomcat:5.5.30
cpe:/a:apache:tomcat:5.5.32
...
CWE    1
CWE-189
OVAL    8
oval:org.secpod.oval:def:202312
oval:org.secpod.oval:def:202309
oval:org.secpod.oval:def:600727
oval:org.secpod.oval:def:3938
...

© 2013 SecPod Technologies