Upstream information

CVE-2013-4287 at MITRE

Description

Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 837457 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Studio Onsite 1.3
  • ruby19 >= 1.9.3.p392-0.13.1
  • ruby19-devel >= 1.9.3.p392-0.13.1
  • ruby19-devel-extra >= 1.9.3.p392-0.13.1
Patchnames:
slestso13-ruby19


SUSE Timeline for this CVE

CVE page created: Wed Sep 11 11:15:05 2013
CVE page last modified: Thu Dec 7 13:06:29 2023