Vulnerability Details : CVE-2012-5371
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
Vulnerability category: Denial of service
Products affected by CVE-2012-5371
- cpe:2.3:a:ruby-lang:ruby:*:p286:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
Threat overview for CVE-2012-5371
Top countries where our scanners detected CVE-2012-5371
Top open port discovered on systems with this issue
22
IPs affected by CVE-2012-5371 1,952
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-5371!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-5371
4.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5371
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-5371
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5371
-
http://securitytracker.com/id?1027747
Ruby Hash Table Collision Bug Lets Remote Users Deny Service - SecurityTrackerPatch
-
http://www.osvdb.org/87280
404 Not Found
-
https://bugzilla.redhat.com/show_bug.cgi?id=875236
875236 – (CVE-2012-5371) CVE-2012-5371 ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)Patch
-
http://secunia.com/advisories/51253
Sign in
-
http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
-
https://www.131002.net/data/talks/appsec12_slides.pdf
-
http://www.ubuntu.com/usn/USN-1733-1
USN-1733-1: Ruby vulnerabilities | Ubuntu security notices
-
http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/
Hash-flooding DoS vulnerability for ruby 1.9 (CVE-2012-5371)Patch;Vendor Advisory
-
http://2012.appsec-forum.ch/conferences/#c17
appsec-forum.ch
-
http://www.securityfocus.com/bid/56484
Ruby CVE-2012-5371 Hash Collision Denial of Service Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79993
Ruby hash generation function denial of service CVE-2012-5371 Vulnerability Report
-
http://www.ocert.org/advisories/ocert-2012-001.html
oCERT archive
Jump to