FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2011-4838

This CVE name corresponds to:

Entered Topic
2012-01-16 Multiple implementations -- DoS via hash algorithm collision

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2011-4838
Phase Assigned(20111215)

Description

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

References

Source Reference
BUGTRAQ 20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table
MISC http://www.nruns.com/_downloads/advisory28122011.pdf
MISC http://www.ocert.org/advisories/ocert-2011-003.html
CONFIRM http://jruby.org/2011/12/27/jruby-1-6-5-1.html
GENTOO GLSA-201207-06
REDHAT RHSA-2012:1232
CERT-VN VU#903934
SECUNIA 47407
SECUNIA 50084
XF jruby-hash-dos(72019)