fkie_cve-2013-4287
Vulnerability from fkie_nvd
Published
2013-10-17 23:55
Modified
2024-11-21 01:55
Severity ?
Summary
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBD0BCCE-898F-4859-A1D8-5D15894BA539", "versionEndIncluding": "1.8.23", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D6A915B-43FF-4FFA-98FA-968403825D43", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "767790C2-2C72-45C0-A4EF-F21EAAAD1698", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "DBAB2571-F73A-4843-A494-1D10A214862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "57847827-F148-42C9-9180-3D5482249CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "323AC584-E261-445D-9C84-DA34DFDE2D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A563E3D-2D87-4712-8C90-067ABB9D6810", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "7B540D22-0BDC-4727-B11E-9667F6E188BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "8D7D308E-2A6C-4DF7-94B1-C5BCC5C3FD24", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "741E979F-6AD5-4C15-8541-5D5F659E5ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "81C93DD3-19B4-431D-A7BD-E86F90F91745", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA2C407B-2C0F-4C46-9F5B-6C63CC887941", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "7865522C-C5D0-4D4B-B090-7B756B36DF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "CA1CDCDA-E1F2-4C23-8448-0EF1D61CE40B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "95AE74A8-4A90-4372-8B88-81FF7E6E578B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "3F6BED14-99EA-4F87-95BB-078D2CEED349", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "7EC8340E-D33E-4DB6-A08B-E56EA035C133", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.16:*:*:*:*:*:*:*", "matchCriteriaId": "4BF3F97C-C396-4AFE-9EC6-4BBD840ED363", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "41E7E929-1144-438A-A55D-0B5CE6886C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.18:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB522C-6EA5-4CF5-B610-CB9414DD4815", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.19:*:*:*:*:*:*:*", "matchCriteriaId": "EF3220D1-DEFF-46A6-95B3-A40838D4E294", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.20:*:*:*:*:*:*:*", "matchCriteriaId": "E8DA4D9E-B822-4254-856C-3176A948D718", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.21:*:*:*:*:*:*:*", "matchCriteriaId": "0D3EAD7C-CB12-4897-B5FA-63D49CDABD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.22:*:*:*:*:*:*:*", "matchCriteriaId": "03AC5DA5-AD7F-4C7F-8437-568B7AAAEB17", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.24:*:*:*:*:*:*:*", "matchCriteriaId": "B549DE72-CB99-4E37-9B0A-CDDBF1AC7B27", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:1.8.25:*:*:*:*:*:*:*", "matchCriteriaId": "CBA0773B-1409-4407-AF8C-ED4212FE8DB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2D82506-3FB5-41BA-8704-CC324C0B0DB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "260A155C-ED09-44E7-8279-5B94A4AC8CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C4E0506F-F2E6-45A2-B637-576C341A71B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2EC4513-B653-438A-A1E4-406D055FC160", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F5FDF363-24FA-45D2-879B-B1CF9B667AE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "03A81F55-2B6B-467C-9281-AA11ED31220F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A8143D88-890D-4C87-9120-46B33D7D63C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3E5608F5-AC8A-4368-9323-A2CC09F18AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EBB4E82A-B1A2-4B35-B961-830FE00F1F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rubygems:rubygems:2.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "CCAD8F26-21A8-42D8-8B12-487F59EB10CD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D9237145-35F8-4E05-B730-77C0F386E5B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C78BB1D8-0505-484D-B824-1AA219F8B247", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "5178D04D-1C29-4353-8987-559AA07443EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "D0535DC9-EB0E-4745-80AC-4A020DF26E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*", "matchCriteriaId": "94F5AA37-B466-4E2E-B217-5119BADDD87B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*", "matchCriteriaId": "6DF0F0F5-4022-4837-9B40-4B1127732CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*", "matchCriteriaId": "B3848B08-85C2-4AAD-AA33-CCEB80EF5B32", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*", "matchCriteriaId": "B7927D40-2A3A-43AD-99F6-CE61882A1FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*", "matchCriteriaId": "AA406EC6-6CA5-40A6-A879-AA8940CBEF07", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*", "matchCriteriaId": "1D041884-3921-4466-9A48-F644FDDA9D50", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*", "matchCriteriaId": "397A2EA7-6F83-427B-8578-3794EBF04849", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*", "matchCriteriaId": "298A5681-F756-4952-A9F8-E4C76736DF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*", "matchCriteriaId": "BC5A12F7-47E2-4AC7-A41B-F4B01319002D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "90E0471D-1323-4E67-B66C-DEBF3BBAEEAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*", "matchCriteriaId": "D2423B85-0971-42AC-8B64-819008BC5778", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*", "matchCriteriaId": "1C663278-3B2A-4B7C-959A-2AA804467F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*", "matchCriteriaId": "B7927149-A76A-48BC-8405-7375FC7D7486", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*", "matchCriteriaId": "CB116A84-1652-4F5D-98AC-81F0349EEDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*", "matchCriteriaId": "259C21E7-6084-4710-9BB3-C232942A451E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "285A3431-BDFE-40C5-92CD-B18217757C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D66B32CB-AC49-4A1C-85ED-6389F27CB319", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression." }, { "lang": "es", "value": "Vulnerabilidad en la complejidad algor\u00edtmicade Gem :: Versi\u00f3n :: VERSION_PATTERN en lib / rubygems / version.rb de RubyGems antes 1.8.23.1, 1.8.24 hasta 1.8.25, 2.0.x antes de 2.0.8, y 2.1.x anterior a 2.1.0 , como se usa en Ruby 1.9.0 hasta 2.0.0p247, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de una versi\u00f3n de una gem manipulada que provoca una gran cantidad de retroceso en una expresi\u00f3n regular." } ], "id": "CVE-2013-4287", "lastModified": "2024-11-21T01:55:17.003", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-17T23:55:04.407", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1427.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1441.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1523.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0207.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/55381" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2013/09/10/1" }, { "source": "secalert@redhat.com", "url": "https://puppet.com/security/cve/cve-2013-4287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1427.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1441.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1523.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1852.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0207.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/55381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2013/09/10/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://puppet.com/security/cve/cve-2013-4287" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.