CVE-2011-5035
CVSS V2 Medium 5
CVSS V3 None
Description
Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
Overview
- CVE ID
- CVE-2011-5035
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2011-12-30T01:55:01
- Last Modified Date
- 2018-01-06T02:29:26
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:* | 1 | OR | 3.1.1 | |
cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:N/I:N/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- NONE
- Availability Impact
- PARTIAL
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2011-5035 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 18:51:14 | Added to TrackCVE |