Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
2011-12-30T01:55:01.610
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.8 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | geronimo | ≤ 2.2.1 | Yes |
Application | apache | geronimo | 1.0 | Yes |
Application | apache | geronimo | 1.1 | Yes |
Application | apache | geronimo | 1.1.1 | Yes |
Application | apache | geronimo | 1.2 | Yes |
Application | apache | geronimo | 2.0.1 | Yes |
Application | apache | geronimo | 2.0.2 | Yes |
Application | apache | geronimo | 2.1 | Yes |
Application | apache | geronimo | 2.1.1 | Yes |
Application | apache | geronimo | 2.1.2 | Yes |
Application | apache | geronimo | 2.1.3 | Yes |
Application | apache | geronimo | 2.1.4 | Yes |
Application | apache | geronimo | 2.1.5 | Yes |
Application | apache | geronimo | 2.1.6 | Yes |
Application | apache | geronimo | 2.1.7 | Yes |
Application | apache | geronimo | 2.1.8 | Yes |
Application | apache | geronimo | 2.2 | Yes |