CVE-2012-5372 in Rubiniusinfo

Summary

Rubinius computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm.

Be aware that VulDB is the high quality source for vulnerability data.

Reservation

10/10/2012

Disclosure

11/28/2012

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Interested in the pricing of exploits?

See the underground prices here!