mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 19:17:37 +02:00
21 lines
1.1 KiB
Markdown
21 lines
1.1 KiB
Markdown
### [CVE-2011-5035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://www.ocert.org/advisories/ocert-2011-003.html
|
|
- http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
|
|
- http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
|
|
- https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|