{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2011-4858","title":"Title"},{"category":"description","text":"Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2011-4858","url":"https://www.suse.com/security/cve/CVE-2011-4858"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 727543 for CVE-2011-4858","url":"https://bugzilla.suse.com/727543"},{"category":"external","summary":"Advisory link for SUSE-SU-2012:0144-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2012-February/000015.html"}],"title":"SUSE CVE CVE-2011-4858","tracking":{"current_release_date":"2023-12-08T05:03:45Z","generator":{"date":"2023-02-15T05:49:42Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2011-4858","initial_release_date":"2023-02-15T05:49:42Z","revision_history":[{"date":"2023-02-15T05:49:42Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:03:45Z","number":"3","summary":"Current version"}],"status":"interim","version":"3"}}}