Vulnerability Details : CVE-2008-3443
The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
Vulnerability category: Denial of service
Products affected by CVE-2008-3443
- cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
Threat overview for CVE-2008-3443
Top countries where our scanners detected CVE-2008-3443
Top open port discovered on systems with this issue
443
IPs affected by CVE-2008-3443 1,791
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-3443!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-3443
18.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-3443
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2008-3443
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3443
-
http://www.redhat.com/support/errata/RHSA-2008-0897.html
-
http://www.redhat.com/support/errata/RHSA-2008-0895.html
-
http://www.vupen.com/english/advisories/2009/1297
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570
-
https://www.exploit-db.com/exploits/6239
-
http://www.securitytracker.com/id?1021075
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44688
-
https://usn.ubuntu.com/691-1/
-
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
-
http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
-
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
-
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
-
http://www.securityfocus.com/bid/30682
-
http://www.debian.org/security/2009/dsa-1695
-
http://support.apple.com/kb/HT3549
About the security content of Security Update 2009-002 / Mac OS X v10.5.7 - Apple Support
-
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Apple Updates for Multiple Vulnerabilities | CISAUS Government Resource
-
https://usn.ubuntu.com/651-1/
-
http://securityreason.com/securityalert/4158
Jump to