First published: Wed Nov 28 2012(Updated: )
Google CityHash computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google CityHash |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6051 has a moderate severity rating due to potential denial of service risks associated with hash collision attacks.
To fix CVE-2012-6051, update to a patched version of Google CityHash that addresses hash collision vulnerabilities.
CVE-2012-6051 is associated with denial of service attacks caused by hash collision exploitation.
Applications that utilize Google CityHash for hash table management may be vulnerable to CVE-2012-6051.
Symptoms of an exploit for CVE-2012-6051 include excessive CPU consumption and application slowdowns or crashes.