Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-3086
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-08 Sep, 2009 | 18:30
Updated At-08 Aug, 2019 | 14:38

A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Ruby on Rails
rubyonrails
>>rails>>2.1.0
cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.1.1
cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.1.2
cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.2.0
cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.2.1
cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.2.2
cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.2
cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*
Ruby on Rails
rubyonrails
>>rails>>2.3.3
cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlcve@mitre.org
N/A
http://secunia.com/advisories/36600cve@mitre.org
N/A
http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-railscve@mitre.org
Patch
http://www.debian.org/security/2011/dsa-2260cve@mitre.org
N/A
http://www.securityfocus.com/bid/37427cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/2544cve@mitre.org
Vendor Advisory
Change History
0Changes found

Details not found