CVE-2014-8090
ruby: REXML incomplete fix for CVE-2014-8080
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
El analizador REXML en Ruby 1.9.x anterior a 1.9.3 patchlevel 551, 2.0.x anterior a 2.0.0 patchlevel 598, y 2.1.x anterior a 2.1.5 permite a atacantes remotos causar una denegación de servicio (consumo de CPU y memoria) a través de un documento XML manipulado que contiene una cadena vacía en una entidad que se utiliza en un número grande de referencias de entidad anidadas, también conocido como un ataque de expansión de entidad XML (XEE). NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2013-1821 y CVE-2014-8080.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-10-10 CVE Reserved
- 2014-11-20 CVE Published
- 2024-07-03 EPSS Updated
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://advisories.mageia.org/MGASA-2014-0472.html | X_refsource_confirm | |
http://secunia.com/advisories/59948 | Third Party Advisory | |
http://secunia.com/advisories/62050 | Third Party Advisory | |
http://secunia.com/advisories/62748 | Third Party Advisory | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/71230 | Vdb Entry | |
https://support.apple.com/HT205267 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://www.ubuntu.com/usn/USN-2412-1 | 2017-01-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | <= 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version " <= 1.9.3" | p550 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p0 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p125 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p194 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p286 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p383 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p385 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p392 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p426 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p429 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p448 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p545 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 1.9.3 Search vendor "Ruby-lang" for product "Ruby" and version "1.9.3" | p547 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | p0 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | p195 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | p247 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | p451 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | p481 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | p576 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.0.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.0.0" | p594 |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.1.1 Search vendor "Ruby-lang" for product "Ruby" and version "2.1.1" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.1.2 Search vendor "Ruby-lang" for product "Ruby" and version "2.1.2" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.1.3 Search vendor "Ruby-lang" for product "Ruby" and version "2.1.3" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.1.4 Search vendor "Ruby-lang" for product "Ruby" and version "2.1.4" | - |
Affected
|