Vulnerability Details : CVE-2012-5370
JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.
Vulnerability category: Denial of service
Products affected by CVE-2012-5370
- cpe:2.3:a:jruby:jruby:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5370
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5370
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-5370
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5370
-
https://bugzilla.redhat.com/show_bug.cgi?id=880671
880671 – (CVE-2012-5370) CVE-2012-5370 jruby: Murmur hash function collisions (oCERT-2012-001)
-
http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
-
http://rhn.redhat.com/errata/RHSA-2013-0533.html
RHSA-2013:0533 - Security Advisory - Red Hat Customer Portal
-
https://www.131002.net/data/talks/appsec12_slides.pdf
-
http://2012.appsec-forum.ch/conferences/#c17
appsec-forum.ch
-
http://www.ocert.org/advisories/ocert-2012-001.html
oCERT archive
Jump to