CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
88.9%
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting
the ability to trigger hash collisions predictably, which allows
context-dependent attackers to cause a denial of service (CPU consumption)
via crafted input to an application that maintains a hash table.
Author | Note |
---|---|
mdeslaur | ruby 1.9+ randomizes hash |
blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-talk/391606
www.kb.cert.org/vuls/id/903934
www.nruns.com/_downloads/advisory28122011.pdf
www.ocert.org/advisories/ocert-2011-003.html
launchpad.net/bugs/cve/CVE-2011-4815
nvd.nist.gov/vuln/detail/CVE-2011-4815
security-tracker.debian.org/tracker/CVE-2011-4815
ubuntu.com/security/notices/USN-1377-1
www.cve.org/CVERecord?id=CVE-2011-4815