4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.005 Low
EPSS
Percentile
77.2%
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN
in lib/rubygems/version.rb
in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
CPE | Name | Operator | Version |
---|---|---|---|
rubygems-update | lt | 2.1.5 | |
rubygems-update | lt | 2.0.10 | |
rubygems-update | lt | 1.8.27 | |
rubygems-update | lt | 1.8.23.2 |
blog.rubygems.org/2013/09/24/CVE-2013-4363.html
www.openwall.com/lists/oss-security/2013/09/14/3
www.openwall.com/lists/oss-security/2013/09/18/8
www.openwall.com/lists/oss-security/2013/09/20/1
github.com/advisories/GHSA-9qvm-2vhf-q649
github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4363.yml
nvd.nist.gov/vuln/detail/CVE-2013-4363
web.archive.org/web/20170331150441/https://puppet.com/security/cve/cve-2013-4363