Vulnerability Details : CVE-2011-5035
Public exploit exists!
Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
Vulnerability category: Input validationDenial of service
Threat overview for CVE-2011-5035
Top countries where our scanners detected CVE-2011-5035
Top open port discovered on systems with this issue
80
IPs affected by CVE-2011-5035 171
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-5035!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-5035
Probability of exploitation activity in the next 30 days: 2.52%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2011-5035
-
Hashtable Collisions
Disclosure Date: 2011-12-28First seen: 2020-04-26auxiliary/dos/http/hashcollision_dosThis module uses a denial-of-service (DoS) condition appearing in a variety of programming languages. This vulnerability occurs when storing multiple values in a hash table and all values have the same hash value. This can cause a web server parsing the POST paramete
CVSS scores for CVE-2011-5035
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-5035
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-5035
-
http://www.nruns.com/_downloads/advisory28122011.pdf
Best 7 Best Internet Security Software in 2019
-
http://marc.info/?l=bugtraq&m=139344343412337&w=2
'[security bulletin] HPSBST02955 rev.1 - HP XP P9000 Performance Advisor Software, 3rd party Software' - MARC
-
http://www.kb.cert.org/vuls/id/903934
VU#903934 - Hash table implementations vulnerable to algorithmic complexity attacksUS Government Resource
- http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
-
http://www.debian.org/security/2012/dsa-2420
Debian -- Security Information -- DSA-2420-1 openjdk-6
-
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html
[security-announce] SUSE-SU-2012:0603-1: important: Security update for
-
http://marc.info/?l=bugtraq&m=133847939902305&w=2
'[security bulletin] HPSBUX02784 SSRT100871 rev.1 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC
-
http://www.ocert.org/advisories/ocert-2011-003.html
oCERT archive
-
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
Oracle Critical Patch Update - April 2012
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16908
Repository / Oval Repository
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
mandriva.com
-
http://marc.info/?l=bugtraq&m=134254957702612&w=2
'[security bulletin] HPSBMU02797 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.1x Running JD' - MARC
-
http://rhn.redhat.com/errata/RHSA-2013-1455.html
RHSA-2013:1455 - Security Advisory - Red Hat Customer Portal
-
http://secunia.com/advisories/48074
Sign in
-
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
Oracle Critical Patch Update - January 2012
-
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
Oracle Critical Patch Update - January 2013
-
http://secunia.com/advisories/48073
Sign in
-
https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py
HashCollision-DOS-POC/HashtablePOC.py at master · FireFart/HashCollision-DOS-POC · GitHub
-
http://rhn.redhat.com/errata/RHSA-2012-0514.html
RHSA-2012:0514 - Security Advisory - Red Hat Customer Portal
-
http://marc.info/?l=bugtraq&m=134254866602253&w=2
'[security bulletin] HPSBMU02799 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.0x Running JD' - MARC
-
http://marc.info/?l=bugtraq&m=133364885411663&w=2
'[security bulletin] HPSBUX02757 SSRT100779 rev.2 - HP-UX Running Java, Remote Unauthorized Access, D' - MARC
-
http://security.gentoo.org/glsa/glsa-201406-32.xml
IcedTea JDK: Multiple vulnerabilities (GLSA 201406-32) — Gentoo security
Products affected by CVE-2011-5035
- cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*