5
CVSSv2

CVE-2014-8090

Published: 21/11/2014 Updated: 03/01/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The REXML parser in Ruby 1.9.x prior to 1.9.3 patchlevel 551, 2.0.x prior to 2.0.0 patchlevel 598, and 2.1.x prior to 2.1.5 allows remote malicious users to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

Vulnerable Product Search on Vulmon Subscribe to Product

ruby-lang ruby 2.0.0

ruby-lang ruby 1.9.3

ruby-lang ruby 2.1.1

ruby-lang ruby 2.1.2

ruby-lang ruby

ruby-lang ruby 2.1.3

ruby-lang ruby 2.1.4

Vendor Advisories

Debian Bug report logs - #770932 ruby21: CVE-2014-8090 Package: ruby21; Maintainer for ruby21 is Antonio Terceiro <terceiro@debianorg>; Source for ruby21 is src:ruby21 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Tue, 25 Nov 2014 10:21:02 UTC Severity: grave Tags: security Foun ...
The REXML parser in Ruby 19x before 193 patchlevel 551, 20x before 200 patchlevel 598, and 21x before 215 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion ...
The upstream patch for CVE-2014-8080 introduced checks against the REXMLentity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, ie checks against the REXML::Documententity_expansion_limit As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amo ...
The upstream patch for CVE-2014-8080 introduced checks against the REXMLentity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, ie checks against the REXML::Documententity_expansion_limit As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amo ...
The upstream patch for CVE-2014-8080 introduced checks against the REXMLentity_expansion_text_limit, but did not add restrictions to limit the number of expansions performed, ie checks against the REXML::Documententity_expansion_limit As a consequence, even with the patch applied, a small XML document could cause REXML to use an excessive amo ...