First published: Wed Nov 28 2012(Updated: )
Google CityHash computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google CityHash |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.