Description
The following problems were fixed in Apache Tomcat version 7.0.23:
-
Important: Denial of service CVE-2012-0022
Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.
Affected Apache Tomcat versions (7.0.0 - 7.0.22).
Remediation
Upgrade to the latest version of Apache Tomcat.
References
Related Vulnerabilities
WordPress 4.2.x Multiple Vulnerabilities (4.2 - 4.2.36)
WordPress Plugin Banner Effect Header Cross-Site Request Forgery (1.2.6)
WordPress Plugin MegaOptim Image Optimizer Unspecified Vulnerability (1.3.2)
Subresource Integrity (SRI) Not Implemented
WordPress Plugin wp-FileManager Arbitrary File Disclosure (1.3.0)