Vulnerability Name: | CVE-2015-4411 (CCN-103887) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2015-06-05 | ||||||||||||||||||||||||||||||||||||
Published: | 2015-06-05 | ||||||||||||||||||||||||||||||||||||
Updated: | 2020-02-28 | ||||||||||||||||||||||||||||||||||||
Summary: | The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. Note: This issue is due to an incomplete fix to CVE-2015-4410. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-4411 Source: MISC Type: Mailing List, Third Party Advisory http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html Source: MISC Type: Mailing List, Third Party Advisory http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html Source: MISC Type: Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2015/06/06/3 Source: MISC Type: Third Party Advisory, VDB Entry http://www.securityfocus.com/bid/75045 Source: CCN Type: Red Hat Bugzilla Bug 1229706 (CVE-2015-4411) CVE-2015-4411 rubygem-moped: Denial of Service with crafted ObjectId string (incomplete fix for CVE-2015-4410) Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1229706 Source: XF Type: UNKNOWN rubygem-moped-cve20154411-dos(103887) Source: CCN Type: RubyGems GIT Repository Use \A \z for checking regex on legal Source: MISC Type: Patch https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999 Source: MISC Type: Patch https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191 Source: MISC Type: Patch https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7 Source: MISC Type: Patch https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24 Source: MISC Type: Exploit, Third Party Advisory https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html Source: CCN Type: RubyGems Web site moped Source: MISC Type: Exploit, Third Party Advisory https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html Source: MISC Type: Mailing List, Third Party Advisory https://seclists.org/oss-sec/2015/q2/653 Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2015-4411 Source: MISC Type: Third Party Advisory, VDB Entry https://www.securityfocus.com/bid/75045 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-4411 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |