First published: Fri Dec 30 2011(Updated: )
Plone 4.1.3 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Plone | <4.1.4 | 4.1.4 |
Plone CMS | <=4.1.3 | |
Plone CMS | =1.0 | |
Plone CMS | =1.0.1 | |
Plone CMS | =1.0.2 | |
Plone CMS | =1.0.3 | |
Plone CMS | =1.0.4 | |
Plone CMS | =1.0.5 | |
Plone CMS | =1.0.6 | |
Plone CMS | =2.0 | |
Plone CMS | =2.0.1 | |
Plone CMS | =2.0.2 | |
Plone CMS | =2.0.3 | |
Plone CMS | =2.0.4 | |
Plone CMS | =2.0.5 | |
Plone CMS | =2.1 | |
Plone CMS | =2.1.1 | |
Plone CMS | =2.1.2 | |
Plone CMS | =2.1.3 | |
Plone CMS | =2.1.4 | |
Plone CMS | =2.5 | |
Plone CMS | =2.5.1 | |
Plone CMS | =2.5.2 | |
Plone CMS | =2.5.3 | |
Plone CMS | =2.5.4 | |
Plone CMS | =2.5.5 | |
Plone CMS | =3.0 | |
Plone CMS | =3.0.1 | |
Plone CMS | =3.0.2 | |
Plone CMS | =3.0.3 | |
Plone CMS | =3.0.4 | |
Plone CMS | =3.0.5 | |
Plone CMS | =3.0.6 | |
Plone CMS | =3.1 | |
Plone CMS | =3.1.1 | |
Plone CMS | =3.1.2 | |
Plone CMS | =3.1.3 | |
Plone CMS | =3.1.4 | |
Plone CMS | =3.1.5.1 | |
Plone CMS | =3.1.6 | |
Plone CMS | =3.1.7 | |
Plone CMS | =3.2 | |
Plone CMS | =3.2.1 | |
Plone CMS | =3.2.2 | |
Plone CMS | =3.2.3 | |
Plone CMS | =3.3 | |
Plone CMS | =3.3.1 | |
Plone CMS | =3.3.2 | |
Plone CMS | =3.3.3 | |
Plone CMS | =3.3.4 | |
Plone CMS | =3.3.5 | |
Plone CMS | =3.3.6 | |
Plone CMS | =4.0 | |
Plone CMS | =4.0.1 | |
Plone CMS | =4.0.2 | |
Plone CMS | =4.0.3 | |
Plone CMS | =4.0.4 | |
Plone CMS | =4.0.5 | |
Plone CMS | =4.0.7 | |
Plone CMS | =4.0.9 | |
Plone CMS | =4.1 | |
Plone CMS | =4.1.1 | |
Plone CMS | =4.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4462 is considered a moderate severity vulnerability that can lead to denial of service due to CPU consumption.
To fix CVE-2011-4462, upgrade to Plone version 4.1.4 or later.
The impact of CVE-2011-4462 allows remote attackers to trigger hash collisions, causing a denial of service.
CVE-2011-4462 affects Plone versions up to and including 4.1.3, as well as earlier versions like 3.0 and 2.5.
As of the current date, there are no publicly available exploits specifically targeting CVE-2011-4462.