CVE-2011-5035

NameCVE-2011-5035
DescriptionOracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2420-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glassfish (PTS)wheezy1:2.1.1-b31g-3fixed
jessie1:2.1.1-b31g+dfsg1-2fixed
buster, sid, stretch1:2.1.1-b31g+dfsg1-4fixed
openjdk-6 (PTS)wheezy, wheezy (security)6b38-1.13.10-1~deb7u1fixed
openjdk-7 (PTS)wheezy7u95-2.6.4-1~deb7u1fixed
wheezy (security)7u151-2.6.11-2~deb7u3fixed
jessie7u111-2.6.7-1~deb8u1fixed
jessie (security)7u151-2.6.11-2~deb8u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glassfishsource(unstable)(not affected)
openjdk-6source(unstable)6b24-1.11.1-1medium
openjdk-6sourcesqueeze6b18-1.8.13-0+squeeze1mediumDSA-2420-1
openjdk-7source(unstable)7~u3-2.1-1medium
sun-java6source(unstable)(unfixed)medium

Notes

[squeeze] - sun-java6 <no-dsa> (Non-free not supported)
- glassfish <not-affected> (Debian only builds some core libs, not the full application stack)

Search for package or bug name: Reporting problems