5
CVSSv2

CVE-2011-4838

Published: 30/12/2011 Updated: 12/01/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

JRuby prior to 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jruby jruby

Vendor Advisories

Debian Bug report logs - #686867 jruby: CVE-2011-4838 Package: jruby; Maintainer for jruby is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Source for jruby is src:jruby (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 6 Sep 2012 20:09:01 UTC Severity: grav ...