Vulnerability Details : CVE-2015-3225
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
Vulnerability category: Denial of service
Products affected by CVE-2015-3225
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.6.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3225
6.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3225
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-3225
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3225
-
http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html
openSUSE-SU-2015:1262-1: moderate: Security update for rubygem-rack-1_4Third Party Advisory
-
https://github.com/rack/rack/blob/master/HISTORY.md
Page not found · GitHub · GitHubPatch;Issue Tracking;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-2290.html
RHSA-2015:2290 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html
openSUSE-SU-2015:1259-1: moderate: Security update for rubygem-rackThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html
openSUSE-SU-2015:1263-1: moderate: Security update for rubygem-rack-1_3Third Party Advisory
-
http://www.debian.org/security/2015/dsa-3322
Debian -- Security Information -- DSA-3322-1 ruby-rack
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html
[SECURITY] Fedora 22 Update: rubygem-rack-1.6.1-2.fc22
-
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ
Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/75232
Rack 'normalize_params()' Function Denial of Service Vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html
[SECURITY] Fedora 21 Update: rubygem-rack-1.5.2-5.fc21
-
http://openwall.com/lists/oss-security/2015/06/16/14
oss-security - [CVE-2015-3225] Potential Denial of Service Vulnerability in RackMailing List;Third Party Advisory
Jump to