First published: Fri Dec 30 2011(Updated: )
Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google V8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-5037 is considered to be moderate, as it can lead to denial of service due to CPU consumption.
To fix CVE-2011-5037, update Google V8 to the latest version that includes patches addressing this vulnerability.
CVE-2011-5037 can be exploited through crafted parameters designed to trigger hash collisions, resulting in denial of service.
CVE-2011-5037 affects Google V8, particularly versions prior to the security updates addressing this issue.
The impact of exploiting CVE-2011-5037 is denial of service, leading to increased CPU consumption and potential service unavailability.