5
CVSSv2

CVE-2012-5370

Published: 28/11/2012 Updated: 18/01/2015
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jruby jruby -

Vendor Advisories

Synopsis Important: JBoss Enterprise SOA Platform 531 update Type/Severity Security Advisory: Important Topic JBoss Enterprise SOA Platform 531, which fixes multiple security issues,various bugs, and adds enhancements, is now available from the Red HatCustomer PortalThe Red Hat Security Response Team h ...
Debian Bug report logs - #694694 jruby: CVE-2012-5370 Package: jruby; Maintainer for jruby is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Source for jruby is src:jruby (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 29 Nov 2012 08:27:02 UTC Severity: grav ...