Vulnerability Description
GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Glib | <= 2.31.8 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
- http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
- http://openwall.com/lists/oss-security/2012/01/10/12
- https://bugzilla.redhat.com/show_bug.cgi?id=772720
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
- http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
- http://openwall.com/lists/oss-security/2012/01/10/12
- https://bugzilla.redhat.com/show_bug.cgi?id=772720
FAQ
What is CVE-2012-0039?
CVE-2012-0039 is a vulnerability with a CVSS score of 7.5 (HIGH). GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to ...
How severe is CVE-2012-0039?
CVE-2012-0039 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0039?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Glib.