First published: Fri Dec 30 2011(Updated: )
Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jruby:jruby-parent | <1.6.5.1 | 1.6.5.1 |
rubygems/rack | >=1.3.0<1.3.6 | 1.3.6 |
rubygems/rack | >=1.2.0<1.2.5 | 1.2.5 |
rubygems/rack | <1.1.3 | 1.1.3 |
Rack-Project Rack | <=1.1.0 | |
Rack-Project Rack | =1.2.0 | |
Rack-Project Rack | =1.2.1 | |
Rack-Project Rack | =1.2.2 | |
Rack-Project Rack | =1.2.3 | |
Rack-Project Rack | =1.2.4 | |
Rack-Project Rack | =1.3.0 | |
Rack-Project Rack | =1.3.1 | |
Rack-Project Rack | =1.3.2 | |
Rack-Project Rack | =1.3.3 | |
Rack-Project Rack | =1.3.4 | |
Rack-Project Rack | =1.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5036 has a moderate severity rating due to its potential for denial of service attacks.
To fix CVE-2011-5036, upgrade Rack to version 1.1.3, 1.2.5, or 1.3.6 or later.
CVE-2011-5036 enables remote attackers to perform denial of service attacks through crafted form parameters.
CVE-2011-5036 affects Rack versions before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6.
While there are no public exploits specifically documented for CVE-2011-5036, its vulnerability can be exploited to exhaust server CPU resources.