First published: Fri Nov 14 2014(Updated: )
The Core Server in OpenAM 9.5.3 through 9.5.5, 10.0.0 through 10.0.2, 10.1.0-Xpress, and 11.0.0 through 11.0.2, when deployed on a multi-server network, allows remote authenticated users to cause a denial of service (infinite loop) via a crafted cookie in a request.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ForgeRock OpenAM | =9.5.3 | |
ForgeRock OpenAM | =9.5.4 | |
ForgeRock OpenAM | =9.5.5 | |
ForgeRock OpenAM | =10.0.0 | |
ForgeRock OpenAM | =10.0.1 | |
ForgeRock OpenAM | =10.0.2 | |
ForgeRock OpenAM | =10.1.0 | |
ForgeRock OpenAM | =11.0.0 | |
ForgeRock OpenAM | =11.0.1 | |
ForgeRock OpenAM | =11.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7246 has a medium severity rating due to its potential for causing a denial of service.
To fix CVE-2014-7246, you should upgrade to ForgeRock OpenAM version 11.0.3 or later.
CVE-2014-7246 affects ForgeRock OpenAM versions from 9.5.3 to 11.0.2.
Yes, CVE-2014-7246 can be exploited by remote authenticated users via a crafted cookie.
CVE-2014-7246 is a denial of service vulnerability that causes an infinite loop in the Core Server of OpenAM.