CVE-2016-0751

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.

References

http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html

http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html

http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html

http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html

http://rhn.redhat.com/errata/RHSA-2016-0296.html

http://www.debian.org/security/2016/dsa-3464

http://www.openwall.com/lists/oss-security/2016/01/25/9

http://www.securityfocus.com/bid/81800

http://www.securitytracker.com/id/1034816

https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ

Details

Source: MITRE

Published: 2016-02-16

Updated: 2019-08-08

Type: CWE-399

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.10:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.9:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.10:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.12:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.1.13:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:* versions up to 3.2.22 (inclusive)

cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.10:rc2:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.12:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:*:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:rc1:*:*:*:*:*:*

cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.11:*:*:*:*:*:*:*

Tenable Plugins

View all (8 total)

IDNameProductFamilySeverity
99128macOS : macOS Server < 5.3 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
93132Debian DLA-604-1 : ruby-actionpack-3.2 security updateNessusDebian Local Security Checks
high
89640Fedora 23 : rubygem-actionpack-4.2.3-4.fc23 (2016-f486068393)NessusFedora Local Security Checks
high
89583Fedora 22 : rubygem-actionpack-4.2.0-3.fc22 / rubygem-activemodel-4.2.0-2.fc22 (2016-94e71ee673)NessusFedora Local Security Checks
high
88613openSUSE Security Update : rubygem-actionpack-3_2 / rubygem-activesupport-3_2 (openSUSE-2016-160)NessusSuSE Local Security Checks
high
88612openSUSE Security Update : rubygem-actionpack-4_2 / rubygem-actionview-4_2 / rubygem-activemodel-4_2 / etc (openSUSE-2016-159)NessusSuSE Local Security Checks
high
88532FreeBSD : rails -- multiple vulnerabilities (bb0ef21d-0e1b-461b-bc3d-9cba39948888)NessusFreeBSD Local Security Checks
high
88499Debian DSA-3464-1 : rails - security updateNessusDebian Local Security Checks
high