Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.8 | HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
CWE ID | Type | Source |
---|---|---|
CWE-20 | Primary | nvd@nist.gov |