Oracle Solaris Third-Party Patch Update : tomcat (multiple_denial_of_service_dos)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x
before 7.0.23 computes hash values for form parameters
without restricting the ability to trigger hash
collisions predictably, which allows remote attackers to
cause a denial of service (CPU consumption) by sending
many crafted parameters. (CVE-2011-4858)

- Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34,
and 7.x before 7.0.23 uses an inefficient approach for
handling parameters, which allows remote attackers to
cause a denial of service (CPU consumption) via a
request that contains many parameters and parameter
values, a different vulnerability than CVE-2011-4858.
(CVE-2012-0022)

See also :

http://www.nessus.org/u?b5f8def1
http://www.nessus.org/u?1c2e3dd7

Solution :

Upgrade to Solaris 11/11 SRU 4.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80790 ()

Bugtraq ID:

CVE ID: CVE-2011-4858
CVE-2012-0022

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now