Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:3099
HistoryJun 18, 2002 - 12:00 a.m.

KPMG-2002021: Resin Large Parameter Denial of Service

2002-06-1800:00:00
vulners.com
8

Title: Resin Large Parameter Denial of Service

BUG-ID: 2002021
Released: 17th Jun 2002

Problem:

It is possible for a malicious user to cause a Denial of Service
by requesting certain malformed URLs from the Resin web server.

Vulnerable:

  • Resin 2.1.1 standalone on Windows 2000 Server

Not Vulnerable:

  • Resin 2.1.2 standalone on Windows 2000 Server

Details:

By defining large variables when accessing non-existant ressources,
it is possible to consume the entire workspace on the server. This
will result in hanging parts of or the entire web server.

Vendor URL:

You can visit the vendor webpage here: http://www.caucho.com

Vendor Response:

This was reported to the vendor on the 22nd of May, 2002. On the 11th
of June, 2002 the vendor released a new version that corrects the
issue.

Corrective action:

Upgrade to version 2.1.2 available from:
http://www.caucho.com/download/

Author: Peter Gründl ([email protected])


KPMG is not responsible for the misuse of the information we provide
through our security advisories. These advisories are a service to
the professional security community. In no event shall KPMG be lia-
ble for any consequences whatsoever arising out of or in connection
with the use or spread of this information.