Vulnerability Description
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Ruby | <= 1.9.2 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2015/07/13/6Mailing ListVDB Entry
- http://www.securitytracker.com/id/1032874Third Party AdvisoryVDB Entry
- https://github.com/ruby/www.ruby-lang.org/issues/817Third Party Advisory
- https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/PatchRelease NotesVendor Advisory
- http://www.openwall.com/lists/oss-security/2015/07/13/6Mailing ListVDB Entry
- http://www.securitytracker.com/id/1032874Third Party AdvisoryVDB Entry
- https://github.com/ruby/www.ruby-lang.org/issues/817Third Party Advisory
- https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/PatchRelease NotesVendor Advisory
FAQ
What is CVE-2014-6438?
CVE-2014-6438 is a vulnerability with a CVSS score of 7.5 (HIGH). The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or applicat...
How severe is CVE-2014-6438?
CVE-2014-6438 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6438?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Ruby.