FreeBSD : tomcat -- Denial of Service (4ca26574-2a2c-11e2-99c7-00a0d181e71d)

medium Nessus Plugin ID 62885

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Apache Software Foundation reports :

The checks that limited the permitted size of request headers were implemented too late in the request parsing process for the HTTP NIO connector. This enabled a malicious user to trigger an OutOfMemoryError by sending a single request with very large headers.
This issue was identified by Josh Spiewak.

Solution

Update the affected packages.

See Also

http://tomcat.apache.org/security.html

http://tomcat.apache.org/security-6.html

http://tomcat.apache.org/security-7.html

http://www.nessus.org/u?c4339bf5

Plugin Details

Severity: Medium

ID: 62885

File Name: freebsd_pkg_4ca265742a2c11e299c700a0d181e71d.nasl

Version: 1.11

Type: local

Published: 11/12/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:tomcat, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/8/2012

Vulnerability Publication Date: 11/5/2012

Reference Information

CVE: CVE-2012-2733