Vulnerability Details : CVE-2012-5372
Rubinius computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm.
Vulnerability category: Denial of service
Products affected by CVE-2012-5372
- cpe:2.3:a:rubinius:rubinius:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5372
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5372
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-5372
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5372
-
http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
Exploit
-
https://www.131002.net/data/talks/appsec12_slides.pdf
Exploit
-
http://www.securityfocus.com/bid/56670
Rubinius CVE-2012-5372 'MurmurHash3' Algorithm Hash Collision Denial of Service Vulnerability
-
http://2012.appsec-forum.ch/conferences/#c17
appsec-forum.ch
-
http://www.ocert.org/advisories/ocert-2012-001.html
oCERT archive
Jump to