Uploaded image for project: 'Geronimo'
  1. Geronimo
  2. GERONIMO-3838

Close potential denial of service attack vector (OOM) in Tomcat session handling



    • Bug
    • Status: Closed
    • Critical
    • Resolution: Fixed
    • 2.0.2, 2.1.1
    • 2.0.3, 2.1.4, 2.2
    • Memory Leaks, security, Tomcat
    • Security Level: public (Regular issues)
    • None
    • tested with JDK 1.5 running on Windows XP and FreeBSD6.2

    • Patch Available


      There is memory leak and it can be repeated very easily, so it should be very easy to catch

      Install Geronimo and then run some kind of benchmarking software against its admin UI login page, for example
      program ab from Apache HTTP. This is realistic attack scenario, because lot of denial of service attacks are doing this (requesting one page many times).

      Watching memory used graph in admin console shows free memory slowly decreasing. After all available memory is exhausted, application server stops serving new requests and never restores ifself back to working state.

      I think that it is caused by allocating sessions without limiting total number of sessions to keep in memory and possibly to swap sessions out to file. There needs to be user-configurable setting for preventing this, it would be nice to add such setting to Admin console.

      Its very important to get this bug fixed.


        1. Geronimo-3838-11-16.patch
          8 kB
          Haihong Xu
        2. Geronimo-3838-11-19 For 2.0.patch
          1.0 kB
          Haihong Xu



            drwoods Donald Woods
            hsn Radim Kolar
            0 Vote for this issue
            1 Start watching this issue