First published: Wed Dec 28 2011(Updated: )
JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubygems | <1.6.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4838 has a severity rating that indicates it can lead to denial of service due to hash collision attacks.
To fix CVE-2011-4838, upgrade JRuby to version 1.6.5.1 or later.
CVE-2011-4838 may allow attackers to consume CPU resources, causing performance issues or downtime for applications using JRuby.
CVE-2011-4838 affects all versions of JRuby prior to 1.6.5.1.
You can identify vulnerability to CVE-2011-4838 by checking the JRuby version in use and reviewing application input handling for hash tables.