Vulnerability Description
Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rack Project | Rack | <= 1.1.0 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
- http://www.debian.org/security/2013/dsa-2783
- http://www.kb.cert.org/vuls/id/903934US Government Resource
- http://www.nruns.com/_downloads/advisory28122011.pdf
- http://www.ocert.org/advisories/ocert-2011-003.html
- https://gist.github.com/52bbc6b9cc19ce330829Exploit
- http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
- http://www.debian.org/security/2013/dsa-2783
- http://www.kb.cert.org/vuls/id/903934US Government Resource
- http://www.nruns.com/_downloads/advisory28122011.pdf
- http://www.ocert.org/advisories/ocert-2011-003.html
- https://gist.github.com/52bbc6b9cc19ce330829Exploit
FAQ
What is CVE-2011-5036?
CVE-2011-5036 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attac...
How severe is CVE-2011-5036?
CVE-2011-5036 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-5036?
Check the references section above for vendor advisories and patch information. Affected products include: Rack Project Rack.