FreeBSD : tomcat -- Denial of Service (7f5ccb1d-439b-11e1-bc16-0023ae8e59f0)

Medium Nessus Plugin ID 57629

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Tomcat security team reports :

Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.

Solution

Update the affected packages.

See Also

http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35

http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.34

http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.23

http://www.nessus.org/u?420a304e

Plugin Details

Severity: Medium

ID: 57629

File Name: freebsd_pkg_7f5ccb1d439b11e1bc160023ae8e59f0.nasl

Version: 1.5

Type: local

Published: 2012/01/23

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:tomcat, p-cpe:/a:freebsd:freebsd:tomcat, p-cpe:/a:freebsd:freebsd:tomcat, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2012/01/17

Vulnerability Publication Date: 2011/10/21

Reference Information

CVE: CVE-2012-0022