Red Hat JBoss Enterprise Application Platform (EAP) 7, when operating as a reverse-proxy with default buffer sizes, allows remote attackers to cause a denial of service (CPU and disk consumption) via a long URL.
References
Configurations
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2640.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2641.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2642.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2657.html - | |
References | () http://www.securityfocus.com/bid/93173 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:3454 - | |
References | () https://access.redhat.com/errata/RHSA-2017:3455 - | |
References | () https://access.redhat.com/errata/RHSA-2017:3456 - | |
References | () https://access.redhat.com/errata/RHSA-2017:3458 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1376646 - Issue Tracking |
Information
Published : 2016-10-03 21:59
Updated : 2024-11-21 02:57
NVD link : CVE-2016-7046
Mitre link : CVE-2016-7046
CVE.ORG link : CVE-2016-7046
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
CWE
CWE-399
Resource Management Errors