Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of service (CPU consumption) via serializable data with a long regex string containing multiple optional groups, a related issue to CVE-2004-2540.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/34892 - Vendor Advisory | |
References | () http://www.packetstormsecurity.org/hitb06/DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf - Exploit | |
References | () http://www.securityfocus.com/archive/1/502926/100/0/threaded - | |
References | () http://www.springsource.com/securityadvisory - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=497161 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50083 - |
Information
Published : 2009-04-27 22:30
Updated : 2024-11-21 01:01
NVD link : CVE-2009-1190
Mitre link : CVE-2009-1190
CVE.ORG link : CVE-2009-1190
JSON object : View
Products Affected
springsource
- dm_server
- spring_framework
sun
- jdk
CWE
CWE-399
Resource Management Errors