First published: Fri Dec 30 2011(Updated: )
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | =1.8.7-p334 | |
Ruby | =1.8.7-p330 | |
Ruby | =1.8.7-p302 | |
Ruby | =1.8.7-p299 | |
Ruby | <=1.8.7-p352 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4815 is classified as a denial of service vulnerability due to its potential to cause excessive CPU consumption.
To fix CVE-2011-4815, upgrade Ruby to version 1.8.7-p357 or later.
CVE-2011-4815 affects Ruby versions 1.8.7-p299 through 1.8.7-p352.
CVE-2011-4815 allows context-dependent attackers to trigger hash collisions, leading to denial of service.
CVE-2011-4815 is related to the Ruby programming language and is not specific to any particular operating system.