Hi All

I am working on resolving the CVE-2012-0022 DoS in JBoss Web, and I wanted to 
confirm some details if anyone can help. Based on reading the advisory and 
Tomcat patch code, it seems to me that the issue is simply slow processing when 
a very large number of parameters is received with a request. The JBoss Web 
patch we implemented for CVE-2011-4858 (hash DoS) limits the number of 
parameters that can be passed with a request to 512 by default. With this limit 
in place, I am unable to reproduce CVE-2012-0022 by passing in a very large 
number of parameters. I wanted to check whether handling a very large number of 
parameters is all that is required to resolve CVE-2012-0022, or whether there 
is something more to it that I have missed?

Thanks in advance
-- 
David Jorm / Red Hat Security Response Team

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to