Lucene search

K
cve[email protected]CVE-2012-0785
HistoryFeb 24, 2020 - 5:15 p.m.

CVE-2012-0785

2020-02-2417:15:13
CWE-400
web.nvd.nist.gov
35
cve-2012-0785
jenkins
vulnerability
hash collision
remote attack
cpu load
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.007 Low

EPSS

Percentile

81.1%

Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka “the Hash DoS attack.”

Affected configurations

Vulners
NVD
Node
jenkins_projectjenkinsRange1.447
OR
jenkins_projectjenkins_ltsRange1.424.2
OR
jenkins_projectjenkins_enterprise_by_cloudbeesRange1.424.01.424.2.1
OR
jenkins_projectjenkins_enterprise_by_cloudbeesRange1.400.01.400.0.11

CNA Affected

[
  {
    "product": "Jenkins",
    "vendor": "Jenkins project",
    "versions": [
      {
        "status": "affected",
        "version": "before 1.447"
      }
    ]
  },
  {
    "product": "Jenkins LTS",
    "vendor": "Jenkins project",
    "versions": [
      {
        "status": "affected",
        "version": "before 1.424.2"
      }
    ]
  },
  {
    "product": "Jenkins Enterprise by CloudBees",
    "vendor": "Jenkins project",
    "versions": [
      {
        "status": "affected",
        "version": "1.424.x before 1.424.2.1"
      },
      {
        "status": "affected",
        "version": "1.400.x before 1.400.0.11"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.007 Low

EPSS

Percentile

81.1%