5
CVSSv2

CVE-2011-5036

Published: 30/12/2011 Updated: 31/10/2013
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Rack prior to 1.1.3, 1.2.x prior to 1.2.5, and 1.3.x prior to 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote malicious users to cause a denial of service (CPU consumption) by sending many crafted parameters.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rack project rack 1.3.0

rack project rack 1.3.1

rack project rack 1.2.0

rack project rack 1.2.1

rack project rack 1.3.4

rack project rack 1.3.5

rack project rack 1.2.2

rack project rack 1.2.3

rack project rack 1.2.4

rack project rack

rack project rack 1.3.2

rack project rack 1.3.3

Vendor Advisories

Debian Bug report logs - #653963 ruby-rack predictable hash collisions Package: ruby-rack; Maintainer for ruby-rack is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for ruby-rack is src:ruby-rack (PTS, buildd, popcon) Reported by: Thijs Kinkhorst <thijs@debianorg> Date: ...
Several vulnerabilities were discovered in Rack, a modular Ruby webserver interface The Common Vulnerabilites and Exposures project identifies the following vulnerabilities: CVE-2011-5036 Rack computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers ...