This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
The Tomcat security team reports :
Analysis of the recent hash collision vulnerability identified
unrelated inefficiencies with Apache Tomcat's handling of large
numbers of parameters and parameter values. These inefficiencies could
allow an attacker, via a specially crafted request, to cause large
amounts of CPU to be used which in turn could create a denial of
service. The issue was addressed by modifying the Tomcat parameter
handling code to efficiently process large numbers of parameters and
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0