Cumin, as used in Red Hat Enterprise MRG 2.4, allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted Ajax update request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_mrg | Redhat | 2.4 (including) | 2.4 (including) |
MRG for RHEL-5 v. 2 | RedHat | condor-0:7.8.9-0.5.el5_9 | * |
MRG for RHEL-5 v. 2 | RedHat | cumin-0:0.1.5786-2.el5_9 | * |
MRG for RHEL-5 v. 2 | RedHat | mrg-release-0:2.4.0-1.el5_9 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-0:7.8.9-0.5.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | cumin-0:0.1.5786-2.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | mrg-release-0:2.4.0-1.el6 | * |