Lucene search

K
redosRedosROS-20240918-12
HistorySep 18, 2024 - 12:00 a.m.

ROS-20240918-12

2024-09-1800:00:00
redos.red-soft.ru
2
ruby
rexml
xml
vulnerability
denial of service
exploitation
remote
resource consumption
parsing
entity extensions
sax2
pull parser api

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

A vulnerability in the Ruby REXML XML toolkit is related to uncontrolled resource consumption.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service

The XML Toolkit for Ruby REXML vulnerability is related to the presence of a DoS vulnerability in XML parsing,
containing many deep elements with the same local name attributes. Exploitation of the vulnerability
Could allow an attacker acting remotely to cause a denial of service

The Ruby REXML XML toolkit vulnerability is related to the presence of a DoS vulnerability in XML parsing,
which has many entity extensions using SAX2 or the pull parser API.Exploitation of the vulnerability
could allow an attacker acting remotely to cause a denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64rubygem-rexml< 3.3.6-1UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High