6.5 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.018 Low
EPSS
Percentile
87.9%
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
CPE | Name | Operator | Version |
---|---|---|---|
enterprise_linux | eq | 6.0 | |
ruby | eq | 1.9.3 p426 | |
ruby | eq | 2.0.0 | |
ruby | eq | 1.9.3 p286 | |
ruby | eq | 1.9.3 p385 | |
ruby | eq | 1.9.3 p383 | |
ruby | eq | 2.0.0 p195 | |
ruby | eq | 1.9.3 p429 | |
ruby | eq | 2.0 | |
ruby | eq | 2.0.0 preview1 |
blog.rubygems.org/2013/09/09/CVE-2013-4287.html
rhn.redhat.com/errata/RHSA-2013-1427.html
rhn.redhat.com/errata/RHSA-2013-1441.html
rhn.redhat.com/errata/RHSA-2013-1523.html
rhn.redhat.com/errata/RHSA-2013-1852.html
rhn.redhat.com/errata/RHSA-2014-0207.html
secunia.com/advisories/55381
www.openwall.com/lists/oss-security/2013/09/10/1
puppet.com/security/cve/cve-2013-4287