Vulnerability Description
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Ruby | <= 1.8.5 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://secunia.com/advisories/31430
- http://secunia.com/advisories/31697
- http://secunia.com/advisories/32165
- http://secunia.com/advisories/32219
- http://secunia.com/advisories/32255
- http://secunia.com/advisories/32256
- http://secunia.com/advisories/32371
- http://secunia.com/advisories/33178
- http://secunia.com/advisories/35074
- http://security.gentoo.org/glsa/glsa-200812-17.xml
- http://support.apple.com/kb/HT3549
- http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264
FAQ
What is CVE-2008-3656?
CVE-2008-3656 is a vulnerability with a CVSS score of 7.8 (HIGH). Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 th...
How severe is CVE-2008-3656?
CVE-2008-3656 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3656?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Ruby.