CVE-2012-5372 in Rubinius
Summary
Rubinius computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm.
Be aware that VulDB is the high quality source for vulnerability data.
Reservation
10/10/2012
Disclosure
11/28/2012
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 63081 | Rubinius cryptographic issue | 310 | Not defined | Not defined | CVE-2012-5372 |