Lucene search

K
ubuntucveUbuntu.comUB:CVE-2012-0840
HistoryFeb 10, 2012 - 12:00 a.m.

CVE-2012-0840

2012-02-1000:00:00
ubuntu.com
ubuntu.com
8

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.008 Low

EPSS

Percentile

81.9%

tables/apr_hash.c in the Apache Portable Runtime (APR) library through
1.4.5 computes hash values without restricting the ability to trigger hash
collisions predictably, which allows context-dependent attackers to cause a
denial of service (CPU consumption) via crafted input to an application
that maintains a hash table.

Bugs

Notes

Author Note
mdeslaur from oss-security: “r1231605 and r1231858 cause massive regressions and test case failures in httpd.” (These were subsequently reverted) CVE was asked to be cancelled: http://www.mail-archive.com/dev%40apr.apache.org/msg24609.html “After extensive consultation with the security projects of various APR consumers, it’s apparent that there are no actual vulnerabilities to be exploited here.” “These changes do not represent either a security DEFECT nor any actual security FIX. The APR Project dis-acknowledges the assignment of CVE-2012-0840 as erroneous, and invalid.” Downgrading priority to “low”.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.008 Low

EPSS

Percentile

81.9%