First published: Mon Feb 24 2020(Updated: )
Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudbees Jenkins | >=1.400.0<1.400.0.11 | |
Cloudbees Jenkins | >=1.424.0<1.424.2.1 | |
Jenkins Jenkins | <1.424.2 | |
Jenkins Jenkins | <1.447 | |
maven/org.jenkins-ci.main:jenkins-core | <1.424.2 | 1.424.2 |
maven/org.jenkins-ci.main:jenkins-core | >=1.425<1.447 | 1.447 |
>=1.400.0<1.400.0.11 | ||
>=1.424.0<1.424.2.1 | ||
<1.424.2 | ||
<1.447 | ||
debian/jenkins | ||
debian/jenkins-executable-war | ||
debian/jenkins-winstone |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0785 is classified as a high severity vulnerability due to its potential to cause significant CPU load through a hash collision attack.
To fix CVE-2012-0785, upgrade Jenkins to version 1.447 or later, or to version 1.424.2 for Jenkins LTS.
CVE-2012-0785 affects Jenkins versions prior to 1.447, Jenkins LTS versions prior to 1.424.2, and certain CloudBees Jenkins Enterprise versions.
CVE-2012-0785 facilitates a denial-of-service attack known as a Hash DoS attack, which can overload the CPU.
CVE-2012-0785 is not a concern for current Jenkins users who have updated to versions 1.447 or later, or 1.424.2 for LTS.