Lucene search

K
rubygemsRubySecRUBY:JRUBY-2012-5370-87864
HistoryNov 22, 2012 - 8:00 p.m.

CVE-2012-5370 jruby: Murmur hash function collisions (oCERT-2012-001)

2012-11-2220:00:00
RubySec
jruby.org
17

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.01

Percentile

83.5%

JRuby computes hash values without properly restricting the ability to
trigger hash collisions predictably, which allows context-dependent attackers to
cause a denial of service (CPU consumption) via crafted input to an application
that maintains a hash table, as demonstrated by a universal multicollision attack
against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.

Affected configurations

Vulners
Node
rubyjrubyRange1.7.1
VendorProductVersionCPE
rubyjruby*cpe:2.3:a:ruby:jruby:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.01

Percentile

83.5%