CVE-2011-4815
ruby: hash table collisions CPU usage DoS (oCERT-2011-003)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (también conocido como CRuby) anterior a v1.8.7-P357 calcula los valores de hash sin restringir la capacidad de desencadenar colisiones hash predecible, que permite a atacantes dependientes de contexto para causar una denegación de servicio (consumo de CPU) a través de entrada diseñado para una aplicación que mantiene un hash mesa.
OS X Lion v10.7.4 and Security Update 2012-002 is now available and addresses multiple security issues. An issue existed in the handling of network account logins. The login process recorded sensitive information in the system log, where other users of the system could read it. A temporary file race condition issue existed in blued's initialization routine. There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. curl disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by enabling empty fragments. A data injection issue existed in curl's handling of URLs. This issue is addressed through improved validation of URLs. This issue does not affect systems prior to OS X Lion. Various other vulnerabilities have been addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-12-14 CVE Reserved
- 2011-12-28 CVE Published
- 2024-08-07 CVE Updated
- 2025-08-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html | Mailing List | |
http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-talk/391606 | Mailing List | |
http://jvn.jp/en/jp/JVN90615481/index.html | Third Party Advisory | |
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000066.html | Third Party Advisory | |
http://secunia.com/advisories/47405 | Third Party Advisory | |
http://secunia.com/advisories/47822 | Third Party Advisory | |
http://support.apple.com/kb/HT5281 | X_refsource_confirm |
|
http://www.kb.cert.org/vuls/id/903934 | Third Party Advisory |
|
http://www.nruns.com/_downloads/advisory28122011.pdf | X_refsource_misc | |
http://www.ocert.org/advisories/ocert-2011-003.html | X_refsource_misc | |
http://www.ruby-lang.org/en/news/2011/12/28/denial-of-service-attack-was-found-for-rubys-hash-algorithm | X_refsource_confirm | |
http://www.securitytracker.com/id?1026474 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72020 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-0069.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-0070.html | 2017-08-29 | |
https://access.redhat.com/security/cve/CVE-2011-4815 | 2012-01-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=750564 | 2012-01-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | <= 1.8.7-p352 Search vendor "Ruby-lang" for product "Ruby" and version " <= 1.8.7-p352" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.8.7-p299 Search vendor "Ruby-lang" for product "Ruby" and version "1.8.7-p299" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.8.7-p302 Search vendor "Ruby-lang" for product "Ruby" and version "1.8.7-p302" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.8.7-p330 Search vendor "Ruby-lang" for product "Ruby" and version "1.8.7-p330" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.8.7-p334 Search vendor "Ruby-lang" for product "Ruby" and version "1.8.7-p334" | - |
Affected
|