Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
2012-11-28T13:03:10.153
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ruby-lang | ruby | ≤ 1.9.3 | Yes |
Application | ruby-lang | ruby | 1.9 | Yes |
Application | ruby-lang | ruby | 1.9.1 | Yes |
Application | ruby-lang | ruby | 1.9.2 | Yes |
Application | ruby-lang | ruby | 1.9.3 | Yes |
Application | ruby-lang | ruby | 1.9.3 | Yes |
Application | ruby-lang | ruby | 1.9.3 | Yes |
Application | ruby-lang | ruby | 1.9.3 | Yes |
Application | ruby-lang | ruby | 2.0 | Yes |