Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2012/01/20/8 | Mailing List Third Party Advisory |
https://access.redhat.com/security/cve/cve-2012-0785 | Broken Link |
https://jenkins.io/security/advisory/2012-01-12/ | Vendor Advisory |
https://security-tracker.debian.org/tracker/CVE-2012-0785 | Third Party Advisory |
https://www.cloudbees.com/jenkins-security-advisory-2012-01-12 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/01/20/8 | Mailing List Third Party Advisory |
https://access.redhat.com/security/cve/cve-2012-0785 | Broken Link |
https://jenkins.io/security/advisory/2012-01-12/ | Vendor Advisory |
https://security-tracker.debian.org/tracker/CVE-2012-0785 | Third Party Advisory |
https://www.cloudbees.com/jenkins-security-advisory-2012-01-12 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2012/01/20/8 - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/security/cve/cve-2012-0785 - Broken Link | |
References | () https://jenkins.io/security/advisory/2012-01-12/ - Vendor Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2012-0785 - Third Party Advisory | |
References | () https://www.cloudbees.com/jenkins-security-advisory-2012-01-12 - Third Party Advisory |
Information
Published : 2020-02-24 17:15
Updated : 2024-11-21 01:35
NVD link : CVE-2012-0785
Mitre link : CVE-2012-0785
CVE.ORG link : CVE-2012-0785
JSON object : View
Products Affected
jenkins
- jenkins
cloudbees
- jenkins
CWE
CWE-400
Uncontrolled Resource Consumption