Lucene search

K
nvd[email protected]NVD:CVE-2012-5371
HistoryNov 28, 2012 - 1:03 p.m.

CVE-2012-5371

2012-11-2813:03:10
CWE-310
web.nvd.nist.gov
6

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

8.3

Confidence

High

EPSS

0.02

Percentile

88.9%

Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.

Affected configurations

NVD
Node
ruby-langrubyRange1.9.3p286
OR
ruby-langrubyMatch1.9
OR
ruby-langrubyMatch1.9.1
OR
ruby-langrubyMatch1.9.2
OR
ruby-langrubyMatch1.9.3
OR
ruby-langrubyMatch1.9.3p0
OR
ruby-langrubyMatch1.9.3p125
OR
ruby-langrubyMatch1.9.3p194
OR
ruby-langrubyMatch2.0

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

8.3

Confidence

High

EPSS

0.02

Percentile

88.9%