A denial of service flaw was found in the way cumin, a unified management interface for the Messaging, Realtime, and Grid components of MRG, used to previously process certain Ajax update queries (the count of entries to be handled within one Ajax query was not limited for upper bound, processing of duplicate identical entries weren't optimized previously for effectiveness - to mention some examples). By issuing a specially-crafted Ajax request, a remote attacker could use this flaw to cause denial (excessive use of system CPU time and memory, possibly leading to cumin daemon to beterminated by OOM killer) of the cumin services. This issue was found by Tomas Novacik of Red Hat.
Created cumin tracking bugs for this issue: Affects: fedora-all [bug 1014282]
This issue has been addressed in following products: MRG for RHEL-5 v. 2 Via RHSA-2013:1295 https://rhn.redhat.com/errata/RHSA-2013-1295.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:1294 https://rhn.redhat.com/errata/RHSA-2013-1294.html