Upstream information

CVE-2012-5371 at MITRE

Description

Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entries: 789983 [RESOLVED / FIXED], 791181 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2013:0376-1


SUSE Timeline for this CVE

CVE page created: Tue Jul 9 19:39:15 2013
CVE page last modified: Thu Dec 7 13:05:45 2023