![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: An URL parameter that is improperly validated might enable an attacker to input an artificially large value. This attack can result in unnecessary consumption of the Java heap.
Potential Impact: An attacker might be able to perform a Denial Of Service (DoS) attack.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Information Delivery Portal | Solaris for x64 | 4.4_M6 | 9.4 TS1M6 | ||
Linux for x64 | 4.4_M6 | 9.4 TS1M6 | ||||
HP-UX IPF | 4.4_M6 | 9.4 TS1M6 | ||||
64-bit Enabled Solaris | 4.4_M6 | 9.4 TS1M6 | ||||
64-bit Enabled AIX | 4.4_M6 | 9.4 TS1M6 | ||||
Microsoft® Windows® for x64 | 4.4_M6 | 9.4 TS1M6 |