CVE-2012-5371
Published Nov 28, 2012
Last updated 7 years ago
Overview
- Description
- Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ruby-lang:ruby:*:p286:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A45A2FA0-5451-4A6D-8301-B60645354AA5", "versionEndIncluding": "1.9.3" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9237145-35F8-4E05-B730-77C0F386E5B2" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C78BB1D8-0505-484D-B824-1AA219F8B247" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5178D04D-1C29-4353-8987-559AA07443EC" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0535DC9-EB0E-4745-80AC-4A020DF26E38" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94F5AA37-B466-4E2E-B217-5119BADDD87B" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DF0F0F5-4022-4837-9B40-4B1127732CC9" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3848B08-85C2-4AAD-AA33-CCEB80EF5B32" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90E0471D-1323-4E67-B66C-DEBF3BBAEEAA" } ], "operator": "OR" } ] } ]