Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-8090

Опубликовано: 21 нояб. 2014
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ruby-lang:ruby:*:p550:*:*:*:*:*:*
Версия до 1.9.3 (включая)
cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p448:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p545:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:p547:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p451:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*

EPSS

Процентиль: 92%
0.09242
Низкий

5 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

redhat
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

debian
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x befo ...

github
больше 3 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

oracle-oval
почти 11 лет назад

ELSA-2014-1911: ruby security update (MODERATE)

EPSS

Процентиль: 92%
0.09242
Низкий

5 Medium

CVSS2

Дефекты

NVD-CWE-Other