CVE-2011-4838

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jruby:jruby:*:*:*:*:*:*:*:*

History

12 Jan 2021, 14:30

Type Values Removed Values Added
CPE cpe:2.3:a:jruby:jruby:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.0:rc3:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:rc3:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:b1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.6:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.6.0:rc3:*:*:*:*:*:*
CWE CWE-20 CWE-400
References (MISC) http://www.ocert.org/advisories/ocert-2011-003.html - (MISC) http://www.ocert.org/advisories/ocert-2011-003.html - Third Party Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/903934 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/903934 - Third Party Advisory, US Government Resource
References (SECUNIA) http://secunia.com/advisories/50084 - (SECUNIA) http://secunia.com/advisories/50084 - Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/72019 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/72019 - Third Party Advisory, VDB Entry
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1232.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1232.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/47407 - (SECUNIA) http://secunia.com/advisories/47407 - Third Party Advisory
References (CONFIRM) http://jruby.org/2011/12/27/jruby-1-6-5-1.html - (CONFIRM) http://jruby.org/2011/12/27/jruby-1-6-5-1.html - Vendor Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-201207-06.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201207-06.xml - Third Party Advisory
References (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html - (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html - Broken Link
References (MISC) http://www.nruns.com/_downloads/advisory28122011.pdf - (MISC) http://www.nruns.com/_downloads/advisory28122011.pdf - Third Party Advisory
CVSS v2 : 7.8
v3 : unknown
v2 : 5.0
v3 : unknown

Information

Published : 2011-12-30 01:55

Updated : 2023-12-10 11:03


NVD link : CVE-2011-4838

Mitre link : CVE-2011-4838

CVE.ORG link : CVE-2011-4838


JSON object : View

Products Affected

jruby

  • jruby
CWE
CWE-400

Uncontrolled Resource Consumption