CVE-2012-0839

OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:inria:ocaml:*:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:1.07:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:2.02:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:2.04:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:2.99:alpha:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.00:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.01:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.02:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.03:alpha:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.04:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.05:beta:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.06:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.07:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.07:beta1:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.07:beta2:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.07:pl2:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.08:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.09:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.10:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.11:*:*:*:*:*:*:*
cpe:2.3:a:inria:ocaml:3.12:*:*:*:*:*:*:*

History

13 Feb 2023, 00:22

Type Values Removed Values Added
References
  • {'url': 'http://www.mail-archive.com/caml-list@inria.fr/msg01477.html', 'name': '[caml-list] 20111230 Hashtbl and security', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'http://www.mail-archive.com/caml-list@inria.fr/msg01478.html', 'name': '[caml-list] 20111230 Re: Hashtbl and security', 'tags': [], 'refsource': 'MLIST'}
  • (MISC) http://www.mail-archive.com/caml-list%40inria.fr/msg01478.html -
  • (MISC) http://www.mail-archive.com/caml-list%40inria.fr/msg01477.html -

Information

Published : 2012-02-08 20:55

Updated : 2023-12-10 11:03


NVD link : CVE-2012-0839

Mitre link : CVE-2012-0839

CVE.ORG link : CVE-2012-0839


JSON object : View

Products Affected

inria

  • ocaml
CWE
CWE-20

Improper Input Validation