Skip to main content

Improper Input Validation

CVE-2011-4815

Severity High
Score 7.8/10

Summary

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

  • LOW
  • NETWORK
  • NONE
  • NONE
  • NONE
  • COMPLETE

CWE-20 - Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

References

Advisory Timeline

  • Published