First published: Sun Aug 12 2012(Updated: )
Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an "HTTP Parameter Contamination" issue.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Caucho Technology Resin | <=4.0.28 | |
Caucho Technology Resin | =2.0.0 | |
Caucho Technology Resin | =2.0.1 | |
Caucho Technology Resin | =2.0.2 | |
Caucho Technology Resin | =2.0.3 | |
Caucho Technology Resin | =2.0.4 | |
Caucho Technology Resin | =2.0.5 | |
Caucho Technology Resin | =2.1.0 | |
Caucho Technology Resin | =2.1.1 | |
Caucho Technology Resin | =2.1.2 | |
Caucho Technology Resin | =2.1.3 | |
Caucho Technology Resin | =2.1.4 | |
Caucho Technology Resin | =2.1.5 | |
Caucho Technology Resin | =2.1.6 | |
Caucho Technology Resin | =2.1.7 | |
Caucho Technology Resin | =2.1.8 | |
Caucho Technology Resin | =2.1.9 | |
Caucho Technology Resin | =2.1.10 | |
Caucho Technology Resin | =2.1.11 | |
Caucho Technology Resin | =2.1.12 | |
Caucho Technology Resin | =2.1.13 | |
Caucho Technology Resin | =2.1.14 | |
Caucho Technology Resin | =2.1.15 | |
Caucho Technology Resin | =2.1.16 | |
Caucho Technology Resin | =2.1.snap | |
Caucho Technology Resin | =3.0.0 | |
Caucho Technology Resin | =3.0.1-beta | |
Caucho Technology Resin | =3.0.2-beta | |
Caucho Technology Resin | =3.0.3 | |
Caucho Technology Resin | =3.0.4 | |
Caucho Technology Resin | =3.0.5 | |
Caucho Technology Resin | =3.0.6 | |
Caucho Technology Resin | =3.0.7 | |
Caucho Technology Resin | =3.0.8 | |
Caucho Technology Resin | =3.0.9 | |
Caucho Technology Resin | =3.0.10 | |
Caucho Technology Resin | =3.0.11 | |
Caucho Technology Resin | =3.0.12 | |
Caucho Technology Resin | =3.0.13 | |
Caucho Technology Resin | =3.0.14 | |
Caucho Technology Resin | =3.0.15 | |
Caucho Technology Resin | =3.0.16 | |
Caucho Technology Resin | =3.0.17 | |
Caucho Technology Resin | =3.0.18 | |
Caucho Technology Resin | =3.0.19 | |
Caucho Technology Resin | =3.0.20 | |
Caucho Technology Resin | =3.1.0 | |
Caucho Technology Resin | =3.1.1 | |
Caucho Technology Resin | =3.1.2 | |
Caucho Technology Resin | =3.1.3 | |
Caucho Technology Resin | =3.1.4 | |
Caucho Technology Resin | =3.1.5 | |
Caucho Technology Resin | =3.1.6 | |
Caucho Technology Resin | =3.1.7 | |
Caucho Technology Resin | =3.1.8 | |
Caucho Technology Resin | =3.1.9 | |
Caucho Technology Resin | =3.1.10 | |
Caucho Technology Resin | =3.1.11 | |
Caucho Technology Resin | =3.1.12 | |
Caucho Technology Resin | =3.1.13 | |
Caucho Technology Resin | =4.0.0 | |
Caucho Technology Resin | =4.0.1 | |
Caucho Technology Resin | =4.0.2 | |
Caucho Technology Resin | =4.0.3 | |
Caucho Technology Resin | =4.0.4 | |
Caucho Technology Resin | =4.0.5 | |
Caucho Technology Resin | =4.0.6 | |
Caucho Technology Resin | =4.0.7 | |
Caucho Technology Resin | =4.0.8 | |
Caucho Technology Resin | =4.0.9 | |
Caucho Technology Resin | =4.0.10 | |
Caucho Technology Resin | =4.0.11 | |
Caucho Technology Resin | =4.0.12 | |
Caucho Technology Resin | =4.0.13 | |
Caucho Technology Resin | =4.0.14 | |
Caucho Technology Resin | =4.0.15 | |
Caucho Technology Resin | =4.0.16 | |
Caucho Technology Resin | =4.0.17 | |
Caucho Technology Resin | =4.0.18 | |
Caucho Technology Resin | =4.0.19 | |
Caucho Technology Resin | =4.0.20 | |
Caucho Technology Resin | =4.0.21 | |
Caucho Technology Resin | =4.0.22 | |
Caucho Technology Resin | =4.0.23 | |
Caucho Technology Resin | =4.0.24 | |
Caucho Technology Resin | =4.0.25 | |
Caucho Technology Resin | =4.0.26 | |
Caucho Technology Resin | =4.0.27 | |
maven/com.caucho:resin | <4.0.29 | 4.0.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-2965 has not been explicitly assigned but involves potential remote attack vectors due to improper variable handling.
To fix CVE-2012-2965, update the Caucho Resin software to version 4.0.29 or later.
CVE-2012-2965 affects Caucho Resin versions prior to 4.0.29 and specific versions from 2.0.0 to 4.0.28.
The impact of CVE-2012-2965 is related to HTTP parameter contamination, which may lead to undefined behavior.
As of now, there are no known public exploits for CVE-2012-2965, but it has remote attack vectors.