FreeBSD : tomcat -- Denial of Service (4ca26574-2a2c-11e2-99c7-00a0d181e71d)

Medium Nessus Plugin ID 62885

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Apache Software Foundation reports :

The checks that limited the permitted size of request headers were implemented too late in the request parsing process for the HTTP NIO connector. This enabled a malicious user to trigger an OutOfMemoryError by sending a single request with very large headers.
This issue was identified by Josh Spiewak.

Solution

Update the affected packages.

See Also

http://tomcat.apache.org/security.html

http://tomcat.apache.org/security-6.html

http://tomcat.apache.org/security-7.html

http://www.nessus.org/u?c4339bf5

Plugin Details

Severity: Medium

ID: 62885

File Name: freebsd_pkg_4ca265742a2c11e299c700a0d181e71d.nasl

Version: 1.9

Type: local

Published: 2012/11/12

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:tomcat, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2012/11/08

Vulnerability Publication Date: 2012/11/05

Reference Information

CVE: CVE-2012-2733