Rejected
This vulnerability has been rejected by the source.
Current Description
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4858. Reason: This candidate is a duplicate of CVE-2011-4858. Notes: All CVE users should reference CVE-2011-4858 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Source:
MITRE
Description Last Modified:
12/29/2011
View Analysis Description
Analysis Description
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 does not properly handle a large number of form parameters, which might allow remote attackers to cause a denial of service (CPU consumption) via a request that triggers storage of many parameters in a hash table.
Source:
MITRE
Description Last Modified:
12/29/2011
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Change History
2 change records found
- show changes
CVE Translated -
5/28/2015 6:45:00 AM
| Action |
Type |
Old Value |
New Value |
| Added |
Translation |
|
** RECHAZADA ** NO UTILICE ESTE NÚMERO DE CANDIDATO. Consulte el identificador: CVE-2011-4858. Motivo: Este candidato es un duplicado delCVE-2011-4858. Notas: Todos los usuarios de los CVEs deben hacer referencia al CVE-2011-4858 en lugar de a este candidato. Todas las referencias y descripciones en este candidato han sido eliminadas para evitar su uso accidental. |
| Removed |
Translation |
Apache Tomcat anterior a v5.5.35, v6.x anterior a v6.0.35, v7.0.23 y v7.x no controla correctamente un gran número de parámetros de forma, lo que podría permitir a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través de una solicitud que activa el almacenamiento de muchos parámetros en una tabla hash. |
|
Initial CVE Analysis -
12/30/2011 1:20:00 PM