CVE-2011-5034
30.12.2011, 01:55
Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.Enginsight
Vendor | Product | Version |
---|---|---|
apache | geronimo | 𝑥 ≤ 2.2.1 |
apache | geronimo | 1.0 |
apache | geronimo | 1.1 |
apache | geronimo | 1.1.1 |
apache | geronimo | 1.2 |
apache | geronimo | 2.0.1 |
apache | geronimo | 2.0.2 |
apache | geronimo | 2.1 |
apache | geronimo | 2.1.1 |
apache | geronimo | 2.1.2 |
apache | geronimo | 2.1.3 |
apache | geronimo | 2.1.4 |
apache | geronimo | 2.1.5 |
apache | geronimo | 2.1.6 |
apache | geronimo | 2.1.7 |
apache | geronimo | 2.1.8 |
apache | geronimo | 2.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References