Cumin, as used in Red Hat Enterprise MRG 2.4, allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted Ajax update request.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1029122 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2013-1295.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-1294.html | vendor advisory |