First published: Mon Feb 10 2014(Updated: )
internal/cimxml/sax/NodeFactory.java in Standards-Based Linux Instrumentation for Manageability (SBLIM) Common Information Model (CIM) Client (aka sblim-cim-client2) before 2.1.12 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Standards-Based Linux Common Information Model Client | <=2.1.11 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2328 has been classified as having a medium severity due to its potential for causing denial of service through hash collision attacks.
To fix CVE-2012-2328, update the Standards-Based Linux Common Information Model Client to version 2.1.12 or later.
CVE-2012-2328 affects versions of the Standards-Based Linux Common Information Model Client before 2.1.12 and specific openSUSE versions 11.4, 12.1, and 12.2.
The impact of CVE-2012-2328 is the ability to exploit predictable hash collisions, which can lead to performance degradation and service interruption.
CVE-2012-2328 can be exploited remotely, making it important to address promptly to secure affected systems.