Vulnerability Details : CVE-2014-8080
Potential exploit
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
Vulnerability category: Denial of service
Products affected by CVE-2014-8080
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:p550:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p448:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p451:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p547:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p545:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Threat overview for CVE-2014-8080
Top countries where our scanners detected CVE-2014-8080
Top open port discovered on systems with this issue
53
IPs affected by CVE-2014-8080 139,341
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-8080!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-8080
9.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8080
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2014-8080
-
http://advisories.mageia.org/MGASA-2014-0443.html
Mageia Advisory: MGASA-2014-0443 - Updated ruby packages fix CVE-2014-8080
-
http://www.ubuntu.com/usn/USN-2397-1
USN-2397-1: Ruby vulnerabilities | Ubuntu security notices
-
http://www.debian.org/security/2015/dsa-3159
Debian -- Security Information -- DSA-3159-1 ruby1.8
-
http://www.securityfocus.com/bid/70935
Ruby CVE-2014-8080 XML External Entity Denial of Service Vulnerability
-
http://secunia.com/advisories/62050
Sign in
-
http://rhn.redhat.com/errata/RHSA-2014-1912.html
RHSA-2014:1912 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html
openSUSE-SU-2014:1589-1: moderate: Security update for ruby19
-
http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html
openSUSE-SU-2015:0002-1: moderate: Security update for ruby20
-
http://www.debian.org/security/2015/dsa-3157
Debian -- Security Information -- DSA-3157-1 ruby1.9.1
-
https://support.apple.com/HT205267
About the security content of OS X El Capitan v10.11 - Apple Support
-
http://rhn.redhat.com/errata/RHSA-2014-1911.html
RHSA-2014:1911 - Security Advisory - Red Hat Customer Portal
-
https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/
CVE-2014-8080: Denial of Service XML ExpansionExploit;Vendor Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Oracle Linux Bulletin - January 2016
-
http://rhn.redhat.com/errata/RHSA-2014-1913.html
RHSA-2014:1913 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2014-1914.html
RHSA-2014:1914 - Security Advisory - Red Hat Customer Portal
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:129
mandriva.com
-
http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html
openSUSE-SU-2015:0007-1: moderate: Security update for ruby2.1
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Apple - Lists.apple.com
Jump to