CVE-2011-4815

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

References

http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html

http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-talk/391606

http://jvn.jp/en/jp/JVN90615481/index.html

http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000066.html

http://lists.apple.com/archives/security-announce/2012/May/msg00001.html

http://rhn.redhat.com/errata/RHSA-2012-0069.html

http://rhn.redhat.com/errata/RHSA-2012-0070.html

http://secunia.com/advisories/47405

http://secunia.com/advisories/47822

http://support.apple.com/kb/HT5281

http://www.kb.cert.org/vuls/id/903934

http://www.nruns.com/_downloads/advisory28122011.pdf

http://www.ocert.org/advisories/ocert-2011-003.html

http://www.ruby-lang.org/en/news/2011/12/28/denial-of-service-attack-was-found-for-rubys-hash-algorithm/

http://www.securitytracker.com/id?1026474

https://exchange.xforce.ibmcloud.com/vulnerabilities/72020

Details

Source: MITRE

Published: 2011-12-30

Updated: 2017-08-29

Type: CWE-20

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (23 total)

IDNameProductFamilySeverity
82233Debian DLA-88-1 : ruby1.8 security updateNessusDebian Local Security Checks
high
80754Oracle Solaris Third-Party Patch Update : ruby (cve_2011_4815_denial_of)NessusSolaris Local Security Checks
high
79980GLSA-201412-27 : Ruby: Denial of ServiceNessusGentoo Local Security Checks
high
76015openSUSE Security Update : ruby (openSUSE-SU-2012:0228-1)NessusSuSE Local Security Checks
high
69642Amazon Linux AMI : ruby (ALAS-2012-35)NessusAmazon Linux Local Security Checks
high
68441Oracle Linux 4 / 5 : ruby (ELSA-2012-0070)NessusOracle Linux Local Security Checks
high
68440Oracle Linux 6 : ruby (ELSA-2012-0069)NessusOracle Linux Local Security Checks
high
61229Scientific Linux Security Update : ruby on SL6.x i386/x86_64 (20120130)NessusScientific Linux Local Security Checks
high
61228Scientific Linux Security Update : ruby on SL4.x, SL5.x i386/x86_64 (20120130)NessusScientific Linux Local Security Checks
high
6482Mac OS X 10.7 < 10.7.4 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
59067Mac OS X Multiple Vulnerabilities (Security Update 2012-002) (BEAST)NessusMacOS X Local Security Checks
critical
59066Mac OS X 10.7.x < 10.7.4 Multiple Vulnerabilities (BEAST)NessusMacOS X Local Security Checks
critical
58163Mandriva Linux Security Advisory : ruby (MDVSA-2012:024)NessusMandriva Local Security Checks
high
58146Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : ruby1.8 vulnerabilities (USN-1377-1)NessusUbuntu Local Security Checks
high
57841SuSE 11.1 Security Update : ruby (SAT Patch Number 5716)NessusSuSE Local Security Checks
high
57840SuSE 11.1 Security Update : ruby (SAT Patch Number 5716)NessusSuSE Local Security Checks
high
57747RHEL 4 / 5 : ruby (RHSA-2012:0070)NessusRed Hat Local Security Checks
high
57746RHEL 6 : ruby (RHSA-2012:0069)NessusRed Hat Local Security Checks
high
57734CentOS 4 / 5 : ruby (CESA-2012:0070)NessusCentOS Local Security Checks
high
57733CentOS 6 : ruby (CESA-2012:0069)NessusCentOS Local Security Checks
high
57552FreeBSD : Multiple implementations -- DoS via hash algorithm collision (91be81e7-3fea-11e1-afc7-2c4138874f7d)NessusFreeBSD Local Security Checks
high
57478Fedora 15 : ruby-1.8.7.357-1.fc15 (2011-17551)NessusFedora Local Security Checks
high
57477Fedora 16 : ruby-1.8.7.357-1.fc16 (2011-17542)NessusFedora Local Security Checks
high