CVE-2012-5370
Published: 28 November 2012
JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.
Priority
Status
Package | Release | Status |
---|---|---|
jruby Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Released
(1.5.6-5)
|
|
upstream |
Needed
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Released
(1.7.19-1)
|
|
yakkety |
Released
(1.7.19-1)
|
|
zesty |
Not vulnerable
|
References
- https://www.131002.net/data/talks/appsec12_slides.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=880671
- http://www.ocert.org/advisories/ocert-2012-001.html
- http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
- http://2012.appsec-forum.ch/conferences/#c17
- https://www.cve.org/CVERecord?id=CVE-2012-5370
- NVD
- Launchpad
- Debian