CVE-2011-5034
Summary
| CVE | CVE-2011-5034 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2011-12-30 01:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
CompleteAV:N/AC:L/Au:N/C:N/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Geronimo | 1.0 | All | All | All |
| Application | Apache | Geronimo | 1.1 | All | All | All |
| Application | Apache | Geronimo | 1.1.1 | All | All | All |
| Application | Apache | Geronimo | 1.2 | All | All | All |
| Application | Apache | Geronimo | 2.0.1 | All | All | All |
| Application | Apache | Geronimo | 2.0.2 | All | All | All |
| Application | Apache | Geronimo | 2.1 | All | All | All |
| Application | Apache | Geronimo | 2.1.1 | All | All | All |
| Application | Apache | Geronimo | 2.1.2 | All | All | All |
| Application | Apache | Geronimo | 2.1.3 | All | All | All |
| Application | Apache | Geronimo | 2.1.4 | All | All | All |
| Application | Apache | Geronimo | 2.1.5 | All | All | All |
| Application | Apache | Geronimo | 2.1.6 | All | All | All |
| Application | Apache | Geronimo | 2.1.7 | All | All | All |
| Application | Apache | Geronimo | 2.1.8 | All | All | All |
| Application | Apache | Geronimo | 2.2 | All | All | All |
| Application | Apache | Geronimo | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Apache Geronimo Web Form Hash Collision Denial of Service Vulnerability - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e77818... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| oCERT.org - oCERT Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.ocert.org | |
| HashCollision-DOS-POC/HashtablePOC.py at master · FireFart/HashCollision-DOS-POC · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | |
| VU#903934 - Hash table implementations vulnerable to algorithmic complexity attacks | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| NEOHAPSIS - Peace of Mind Through Integrity and Insight | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9c... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03c... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b5... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c017701... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| Best 7 Best Internet Security Software in 2019 | af854a3a-2127-422b-91ae-364da2661108 | www.nruns.com | |
| lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe1634871486... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cf... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 996908 Java (Maven) Security Update for org.apache.geronimo:geronimo (GHSA-v3h8-rw48-h4gr)