First published: Sun Jul 26 2015(Updated: )
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rack | >=1.4.0<1.4.6 | 1.4.6 |
rubygems/rack | >=1.5.0<1.5.4 | 1.5.4 |
rubygems/rack | >=1.6.0<1.6.2 | 1.6.2 |
Rack-Project Rack | <=1.5.3 | |
Rack-Project Rack | =1.6.0 | |
Rack-Project Rack | =1.6.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3225 is classified as a moderate severity vulnerability due to its potential to cause denial of service.
To fix CVE-2015-3225, upgrade Rack to version 1.5.4, 1.6.2, or later.
CVE-2015-3225 affects Rack versions before 1.5.4 and 1.6.x before 1.6.2, commonly used with Ruby on Rails 3.x and 4.x.
CVE-2015-3225 enables remote attackers to trigger a SystemStackError by sending requests with a large parameter depth.
CVE-2015-3225 is a remote vulnerability, allowing attackers to exploit it over a network.