Vulnerability Name: | CVE-2012-5371 (CCN-79993) | ||||||||||||||||
Assigned: | 2012-11-10 | ||||||||||||||||
Published: | 2012-11-10 | ||||||||||||||||
Updated: | 2017-08-29 | ||||||||||||||||
Summary: | Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815. | ||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-310 | ||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||
References: | Source: MISC Type: UNKNOWN http://2012.appsec-forum.ch/conferences/#c17 Source: MISC Type: UNKNOWN http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf Source: MITRE Type: CNA CVE-2012-5371 Source: CCN Type: RHSA-2013-0582 Moderate: Red Hat OpenShift Enterprise 1.1.1 update Source: CCN Type: SA51253 Ruby Web Form Object Hash Collision Denial of Service Vulnerability Source: SECUNIA Type: UNKNOWN 51253 Source: SECTRACK Type: Patch 1027747 Source: MISC Type: UNKNOWN http://www.ocert.org/advisories/ocert-2012-001.html Source: OSVDB Type: UNKNOWN 87280 Source: CCN Type: OSVDB ID: 87280 Ruby String Key Object Hashing Hash Collision Form Parameter Parsing Remote DoS Source: CCN Type: OSVDB ID: 87863 Ruby MurmurHash Implementation Hash Collision Remote DoS Source: CCN Type: Ruby Web Site Hash-flooding DoS vulnerability for ruby 1.9 (CVE-2012-5371) Source: CONFIRM Type: Patch, Vendor Advisory http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/ Source: BID Type: UNKNOWN 56484 Source: CCN Type: BID-56484 Ruby CVE-2012-5371 Hash Collision Denial of Service Vulnerability Source: UBUNTU Type: UNKNOWN USN-1733-1 Source: CONFIRM Type: Patch https://bugzilla.redhat.com/show_bug.cgi?id=875236 Source: XF Type: UNKNOWN ruby-hash-function-dos(79993) Source: XF Type: UNKNOWN ruby-hash-function-dos(79993) Source: MISC Type: UNKNOWN https://www.131002.net/data/talks/appsec12_slides.pdf | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |