Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
CPE | Name | Operator | Version |
---|---|---|---|
jdk | le | 1.7.0 | |
jdk | eq | 1.7.0 update2 | |
jdk | eq | 1.7.0 | |
jdk | eq | 1.7.0 update3 | |
jdk | eq | 1.7.0 update1 | |
jdk | eq | 1.7.0 update4 | |
jre | eq | 1.7.0 update3 | |
jre | eq | 1.7.0 update2 | |
jre | le | 1.7.0 | |
jre | eq | 1.7.0 update4 |
armoredbarista.blogspot.de/2012/02/investigating-hashdos-issue.html
mail.openjdk.java.net/pipermail/core-libs-dev/2012-May/010238.html
www.kb.cert.org/vuls/id/903934
www.nruns.com/_downloads/advisory28122011.pdf
www.ocert.org/advisories/ocert-2011-003.html
www.openwall.com/lists/oss-security/2012/06/15/12
www.openwall.com/lists/oss-security/2012/06/17/1
bugzilla.redhat.com/show_bug.cgi?id=750533