Red Hat JBoss Enterprise Application Platform (EAP) 7, when operating as a reverse-proxy with default buffer sizes, allows remote attackers to cause a denial of service (CPU and disk consumption) via a long URL.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:57
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://rhn.redhat.com/errata/RHSA-2016-2640.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2016-2641.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2016-2642.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2016-2657.html - | |
| References | () http://www.securityfocus.com/bid/93173 - Third Party Advisory, VDB Entry | |
| References | () https://access.redhat.com/errata/RHSA-2017:3454 - | |
| References | () https://access.redhat.com/errata/RHSA-2017:3455 - | |
| References | () https://access.redhat.com/errata/RHSA-2017:3456 - | |
| References | () https://access.redhat.com/errata/RHSA-2017:3458 - | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1376646 - Issue Tracking | 
Information
                Published : 2016-10-03 21:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-7046
Mitre link : CVE-2016-7046
CVE.ORG link : CVE-2016-7046
JSON object : View
Products Affected
                redhat
- jboss_enterprise_application_platform
CWE
                
                    
                        
                        CWE-399
                        
            Resource Management Errors
