Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2009-1904

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-11 Jun, 2009 | 21:00
Updated At-07 Aug, 2024 | 05:27
Rejected At-
Credits

The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:11 Jun, 2009 | 21:00
Updated At:07 Aug, 2024 | 05:27
Rejected At:
▼CVE Numbering Authority (CNA)

The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vupen.com/english/advisories/2009/1563
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/35937
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/35593
third-party-advisory
x_refsource_SECUNIA
http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/
x_refsource_CONFIRM
http://redmine.ruby-lang.org/issues/show/794
x_refsource_CONFIRM
https://bugs.launchpad.net/bugs/cve/2009-1904
x_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2009-1140.html
vendor-advisory
x_refsource_REDHAT
http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html
mailing-list
x_refsource_MLIST
http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source
mailing-list
x_refsource_MLIST
http://www.securitytracker.com/id?1022371
vdb-entry
x_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780
vdb-entry
signature
x_refsource_OVAL
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/35399
third-party-advisory
x_refsource_SECUNIA
http://github.com/NZKoz/bigdecimal-segfault-fix/tree/master
x_refsource_CONFIRM
http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/
x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-805-1
vendor-advisory
x_refsource_UBUNTU
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html
vendor-advisory
x_refsource_FEDORA
http://osvdb.org/55031
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/bid/35278
vdb-entry
x_refsource_BID
http://bugs.gentoo.org/show_bug.cgi?id=273213
x_refsource_CONFIRM
http://secunia.com/advisories/37705
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT4077
x_refsource_CONFIRM
http://secunia.com/advisories/35699
third-party-advisory
x_refsource_SECUNIA
https://bugs.launchpad.net/bugs/385436
x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200906-02.xml
vendor-advisory
x_refsource_GENTOO
http://www.mandriva.com/security/advisories?name=MDVSA-2009:160
vendor-advisory
x_refsource_MANDRIVA
http://www.ruby-forum.com/topic/189071
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/51032
vdb-entry
x_refsource_XF
http://secunia.com/advisories/35527
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.vupen.com/english/advisories/2009/1563
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/35937
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/35593
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/
Resource:
x_refsource_CONFIRM
Hyperlink: http://redmine.ruby-lang.org/issues/show/794
Resource:
x_refsource_CONFIRM
Hyperlink: https://bugs.launchpad.net/bugs/cve/2009-1904
Resource:
x_refsource_CONFIRM
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2009-1140.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.securitytracker.com/id?1022371
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/35399
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://github.com/NZKoz/bigdecimal-segfault-fix/tree/master
Resource:
x_refsource_CONFIRM
Hyperlink: http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ubuntu.com/usn/USN-805-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://osvdb.org/55031
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/bid/35278
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=273213
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/37705
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT4077
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/35699
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugs.launchpad.net/bugs/385436
Resource:
x_refsource_CONFIRM
Hyperlink: http://security.gentoo.org/glsa/glsa-200906-02.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:160
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.ruby-forum.com/topic/189071
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/51032
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/35527
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805
Resource:
vendor-advisory
x_refsource_SLACKWARE
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vupen.com/english/advisories/2009/1563
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/35937
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/35593
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/
x_refsource_CONFIRM
x_transferred
http://redmine.ruby-lang.org/issues/show/794
x_refsource_CONFIRM
x_transferred
https://bugs.launchpad.net/bugs/cve/2009-1904
x_refsource_CONFIRM
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2009-1140.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html
mailing-list
x_refsource_MLIST
x_transferred
http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source
mailing-list
x_refsource_MLIST
x_transferred
http://www.securitytracker.com/id?1022371
vdb-entry
x_refsource_SECTRACK
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/35399
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://github.com/NZKoz/bigdecimal-segfault-fix/tree/master
x_refsource_CONFIRM
x_transferred
http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/
x_refsource_CONFIRM
x_transferred
http://www.ubuntu.com/usn/USN-805-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://osvdb.org/55031
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/bid/35278
vdb-entry
x_refsource_BID
x_transferred
http://bugs.gentoo.org/show_bug.cgi?id=273213
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/37705
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT4077
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/35699
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugs.launchpad.net/bugs/385436
x_refsource_CONFIRM
x_transferred
http://security.gentoo.org/glsa/glsa-200906-02.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2009:160
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.ruby-forum.com/topic/189071
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/51032
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/35527
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/1563
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/35937
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/35593
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://redmine.ruby-lang.org/issues/show/794
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://bugs.launchpad.net/bugs/cve/2009-1904
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2009-1140.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.securitytracker.com/id?1022371
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/35399
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://github.com/NZKoz/bigdecimal-segfault-fix/tree/master
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-805-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://osvdb.org/55031
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/bid/35278
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=273213
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/37705
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT4077
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/35699
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugs.launchpad.net/bugs/385436
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200906-02.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:160
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.ruby-forum.com/topic/189071
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/51032
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/35527
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:11 Jun, 2009 | 21:30
Updated At:23 Apr, 2026 | 00:35

The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Ruby
ruby-lang
>>ruby>>1.8.6
cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7
cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689cve@mitre.org
Patch
http://bugs.gentoo.org/show_bug.cgi?id=273213cve@mitre.org
N/A
http://github.com/NZKoz/bigdecimal-segfault-fix/tree/mastercve@mitre.org
Patch
http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=sourcecve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlcve@mitre.org
N/A
http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.htmlcve@mitre.org
N/A
http://osvdb.org/55031cve@mitre.org
N/A
http://redmine.ruby-lang.org/issues/show/794cve@mitre.org
Exploit
Patch
http://secunia.com/advisories/35399cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/35527cve@mitre.org
N/A
http://secunia.com/advisories/35593cve@mitre.org
N/A
http://secunia.com/advisories/35699cve@mitre.org
N/A
http://secunia.com/advisories/35937cve@mitre.org
N/A
http://secunia.com/advisories/37705cve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-200906-02.xmlcve@mitre.org
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805cve@mitre.org
N/A
http://support.apple.com/kb/HT4077cve@mitre.org
N/A
http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/cve@mitre.org
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2009:160cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2009-1140.htmlcve@mitre.org
N/A
http://www.ruby-forum.com/topic/189071cve@mitre.org
N/A
http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/cve@mitre.org
Patch
Vendor Advisory
http://www.securityfocus.com/bid/35278cve@mitre.org
N/A
http://www.securitytracker.com/id?1022371cve@mitre.org
N/A
http://www.ubuntu.com/usn/USN-805-1cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/1563cve@mitre.org
N/A
https://bugs.launchpad.net/bugs/385436cve@mitre.org
N/A
https://bugs.launchpad.net/bugs/cve/2009-1904cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/51032cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.htmlcve@mitre.org
N/A
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689af854a3a-2127-422b-91ae-364da2661108
Patch
http://bugs.gentoo.org/show_bug.cgi?id=273213af854a3a-2127-422b-91ae-364da2661108
N/A
http://github.com/NZKoz/bigdecimal-segfault-fix/tree/masteraf854a3a-2127-422b-91ae-364da2661108
Patch
http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=sourceaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://osvdb.org/55031af854a3a-2127-422b-91ae-364da2661108
N/A
http://redmine.ruby-lang.org/issues/show/794af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://secunia.com/advisories/35399af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35527af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/35593af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/35699af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/35937af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/37705af854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-200906-02.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.apple.com/kb/HT4077af854a3a-2127-422b-91ae-364da2661108
N/A
http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2009:160af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2009-1140.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ruby-forum.com/topic/189071af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.securityfocus.com/bid/35278af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id?1022371af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-805-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2009/1563af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugs.launchpad.net/bugs/385436af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugs.launchpad.net/bugs/cve/2009-1904af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/51032af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=273213
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://github.com/NZKoz/bigdecimal-segfault-fix/tree/master
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/55031
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://redmine.ruby-lang.org/issues/show/794
Source: cve@mitre.org
Resource:
Exploit
Patch
Hyperlink: http://secunia.com/advisories/35399
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35527
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/35593
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/35699
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/35937
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/37705
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200906-02.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT4077
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:160
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2009-1140.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ruby-forum.com/topic/189071
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/35278
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1022371
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-805-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/1563
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://bugs.launchpad.net/bugs/385436
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://bugs.launchpad.net/bugs/cve/2009-1904
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/51032
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=532689
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://bugs.gentoo.org/show_bug.cgi?id=273213
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://github.com/NZKoz/bigdecimal-segfault-fix/tree/master
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://osvdb.org/55031
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://redmine.ruby-lang.org/issues/show/794
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://secunia.com/advisories/35399
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/35527
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/35593
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/35699
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/35937
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/37705
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200906-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT4077
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://weblog.rubyonrails.org/2009/6/10/dos-vulnerability-in-ruby/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:160
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2009-1140.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ruby-forum.com/topic/189071
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/35278
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1022371
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-805-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/1563
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugs.launchpad.net/bugs/385436
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugs.launchpad.net/bugs/cve/2009-1904
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/51032
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9780
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

12Records found

CVE-2013-1821
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-20.67% / 95.62%
||
7 Day CHG~0.00%
Published-09 Apr, 2013 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-14033
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-8.18% / 92.22%
||
7 Day CHG~0.00%
Published-19 Sep, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-5371
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.79% / 82.86%
||
7 Day CHG~0.00%
Published-28 Nov, 2012 | 11:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CVE-2008-3790
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-28.84% / 96.58%
||
7 Day CHG~0.00%
Published-27 Aug, 2008 | 20:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-3443
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-29.25% / 96.62%
||
7 Day CHG~0.00%
Published-14 Aug, 2008 | 23:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CVE-2014-8090
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-9.49% / 92.86%
||
7 Day CHG~0.00%
Published-21 Nov, 2014 | 15:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CVE-2014-8080
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-9.76% / 92.98%
||
7 Day CHG~0.00%
Published-03 Nov, 2014 | 16:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSERubyRed Hat, Inc.
Product-rubyubuntu_linuxopensuseenterprise_linuxn/a
CVE-2017-9229
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 59.67%
||
7 Day CHG~0.00%
Published-24 May, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.

Action-Not Available
Vendor-oniguruma_projectn/aThe PHP GroupRuby
Product-onigurumarubyphpn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2014-6438
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.13% / 78.39%
||
7 Day CHG~0.00%
Published-06 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CVE-2018-8777
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.45% / 80.87%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 22:00
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.RubyRed Hat, Inc.
Product-ubuntu_linuxdebian_linuxrubyenterprise_linuxn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2017-6181
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.70% / 71.99%
||
7 Day CHG~0.00%
Published-03 Apr, 2017 | 05:44
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-41817
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.50% / 65.81%
||
7 Day CHG~0.00%
Published-01 Jan, 2022 | 00:00
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.

Action-Not Available
Vendor-n/aFedora ProjectDebian GNU/LinuxRubySUSEopenSUSERed Hat, Inc.
Product-debian_linuxfactorysoftware_collectionslinux_enterprisefedoraenterprise_linuxrubydateleapn/a
CWE ID-CWE-1333
Inefficient Regular Expression Complexity
Details not found