Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
References
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 02:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
30 Jul 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Jul 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jul 2021, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2011-12-30 01:55
Updated : 2023-12-10 11:03
NVD link : CVE-2011-5034
Mitre link : CVE-2011-5034
CVE.ORG link : CVE-2011-5034
JSON object : View
Products Affected
apache
- geronimo
CWE
CWE-20
Improper Input Validation