On 01/21/2012 07:16 PM, Remy Maucherat wrote:
On Sat, Jan 21, 2012 at 9:02 AM, David Jorm<dj...@redhat.com>  wrote:
Hi All

I am working on resolving the CVE-2012-0022 DoS in JBoss Web, and I wanted to 
confirm some details if anyone can help. Based on reading the advisory and 
Tomcat patch code, it seems to me that the issue is simply slow processing when 
a very large number of parameters is received with a request. The JBoss Web 
patch we implemented for CVE-2011-4858 (hash DoS) limits the number of 
parameters that can be passed with a request to 512 by default. With this limit 
in place, I am unable to reproduce CVE-2012-0022 by passing in a very large 
number of parameters. I wanted to check whether handling a very large number of 
parameters is all that is required to resolve CVE-2012-0022, or whether there 
is something more to it that I have missed?

JBoss Web and Tomcat are separate products, and issues are often dealt
with in different ways. Please do not bother the Tomcat community with
issues that do not concern them.

Rémy


Sorry, I think I unnecessarily confused things by mentioning JBoss Web. The point of my question was to check whether my understanding of the CVE-2012-0022 issue is complete, i.e. whether the issue is just slow processing leading to a DoS when a very large number of parameters is received with a request, or whether there is some further complexity that I have overlooked. My understanding of Tomcat is incomplete, so I just wanted to check whether my reading of the advisory and patch was correct or not. The intent is to apply this understanding to fixing the issue for JBoss Web, but that is decoupled from the question.

Thanks
David

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to