Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4363 from the MITRE CVE dictionary dictionary and NIST NVD.
Not vulnerable. This issue did not affect the versions of rubygems as shipped with various Red Hat products.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 2.6 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Subscription Asset Manager 1 | rubygems | Not affected |
Red Hat Software Collections 1 for Red Hat Enterprise Linux | ruby193-ruby | Not affected |
Red Hat Satellite 6 | rubygems | Not affected |
Red Hat Satellite 6 | ruby193-rubygems | Not affected |
Red Hat OpenShift Enterprise 1 | rubygems | Not affected |
Red Hat OpenShift Enterprise 1 | ruby193-ruby | Not affected |
Red Hat Enterprise MRG 2 | rubygems | Not affected |
Red Hat Enterprise Linux OpenStack Platform 3.0 | ruby193-rubygems | Not affected |
Red Hat Enterprise Linux 7 | ruby | Not affected |
Red Hat Enterprise Linux 6 | rubygems | Not affected |