class Dawn::Kb::CVE_2012_5370
Automatically created with rake on 2013-05-30
Public Class Methods
new()
click to toggle source
Calls superclass method
# File lib/dawn/kb/cve_2012_5370.rb, line 7 def initialize message="JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838." super({ :name=>"CVE-2012-5370", :cvss=>"AV:N/AC:L/Au:N/C:N/I:N/A:P", :release_date => Date.new(2012, 11, 28), :cwe=>"310", :owasp=>"A9", :applies=>["rails", "sinatra", "padrino"], :kind=>Dawn::KnowledgeBase::RUBY_VERSION_CHECK, :message=>message, :mitigation=>"At the moment we're writing this (May 2013) there is no mitigation against this vulnerability. You must consider changing your hashing algorithm", :aux_links=>["https://bugzilla.redhat.com/show_bug.cgi?id=880671"] }) self.safe_rubies = [{:engine=>"jruby", :version=>"999.999.999", :patchlevel=>"p999"}] end