DescriptionJetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- openSUSE-SU-2012:0262-1, published Thu, 16 Feb 2012 15:08:26 +0100 (CET)
List of released packages
|Product(s)||Fixed package version(s)||References|
|openSUSE 11.4|| |
|openSUSE 11.4|| ||Patchnames: