7.8
CVSSv2

CVE-2011-4815

Published: 30/12/2011 Updated: 29/08/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Ruby (aka CRuby) prior to 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruby-lang ruby 1.8.7-p334

ruby-lang ruby 1.8.7-p330

ruby-lang ruby 1.8.7-p302

ruby-lang ruby 1.8.7-p299

ruby-lang ruby

Vendor Advisories

Several security issues were fixed in ruby18 ...
Synopsis Moderate: ruby security update Type/Severity Security Advisory: Moderate Topic Updated ruby packages that fix one security issue are now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability Scoring ...
Synopsis Moderate: ruby security update Type/Severity Security Advisory: Moderate Topic Updated ruby packages that fix two security issues are now available forRed Hat Enterprise Linux 4 and 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability Sc ...
Debian Bug report logs - #800564 php5: trivial hash complexity DoS attack Package: php5-cli; Maintainer for php5-cli is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5-cli is src:php5 (PTS, buildd, popcon) Reported by: "brian m carlson" <sandals@crustytoothpastenet> Date: Wed, 30 Sep ...
Ruby (aka CRuby) before 187-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table ...