Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-5037

Опубликовано: 30 дек. 2011
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

not-affected

3.7.12.22-3
quantal

ignored

end of life
raring

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

not-affected

3.14.5.8-5ubuntu1
esm-apps/xenial

not-affected

3.14.5.8-5ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.14.5.8-5ubuntu1]]
lucid

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

ignored

end of life
trusty

not-affected

3.14.5.8-5ubuntu1
trusty/esm

DNE

trusty was not-affected [3.14.5.8-5ubuntu1]

Показывать по

5 Medium

CVSS2

Связанные уязвимости

redhat
около 14 лет назад

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

nvd
около 14 лет назад

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

debian
около 14 лет назад

Google V8 computes hash values for form parameters without restricting ...

github
больше 3 лет назад

Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.

5 Medium

CVSS2