ID CVE-2011-5036
Summary Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
References
Vulnerable Configurations
  • cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 31-10-2013 - 03:21)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bugtraq 20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table
cert-vn VU#903934
confirm https://gist.github.com/52bbc6b9cc19ce330829
debian DSA-2783
misc
Last major update 31-10-2013 - 03:21
Published 30-12-2011 - 01:55
Last modified 31-10-2013 - 03:21
Back to Top