CVE
- Id
- 33773
- CVE No.
- CVE-2008-3656
- Status
- Candidate
- Description
- Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
- Phase
- Assigned (20080812)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
368118 | 33773 | CVE-2008-3656 | BUGTRAQ:20080831 rPSA-2008-0264-1 ruby | View |
368119 | 33773 | CVE-2008-3656 | URL:http://www.securityfocus.com/archive/1/archive/1/495884/100/0/threaded | View |
368120 | 33773 | CVE-2008-3656 | CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 | View |
368121 | 33773 | CVE-2008-3656 | CONFIRM:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ | View |
368122 | 33773 | CVE-2008-3656 | CONFIRM:http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264 | View |
368123 | 33773 | CVE-2008-3656 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm | View |
368124 | 33773 | CVE-2008-3656 | CONFIRM:http://support.apple.com/kb/HT3549 | View |
368125 | 33773 | CVE-2008-3656 | APPLE:APPLE-SA-2009-05-12 | View |
368126 | 33773 | CVE-2008-3656 | URL:http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | View |
368127 | 33773 | CVE-2008-3656 | DEBIAN:DSA-1651 | View |
368128 | 33773 | CVE-2008-3656 | URL:http://www.debian.org/security/2008/dsa-1651 | View |
368129 | 33773 | CVE-2008-3656 | DEBIAN:DSA-1652 | View |
368130 | 33773 | CVE-2008-3656 | URL:http://www.debian.org/security/2008/dsa-1652 | View |
368131 | 33773 | CVE-2008-3656 | FEDORA:FEDORA-2008-8736 | View |
368132 | 33773 | CVE-2008-3656 | URL:https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html | View |
368133 | 33773 | CVE-2008-3656 | FEDORA:FEDORA-2008-8738 | View |
368134 | 33773 | CVE-2008-3656 | URL:https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html | View |
368135 | 33773 | CVE-2008-3656 | GENTOO:GLSA-200812-17 | View |
368136 | 33773 | CVE-2008-3656 | URL:http://security.gentoo.org/glsa/glsa-200812-17.xml | View |
368137 | 33773 | CVE-2008-3656 | REDHAT:RHSA-2008:0897 | View |
368138 | 33773 | CVE-2008-3656 | URL:http://www.redhat.com/support/errata/RHSA-2008-0897.html | View |
368139 | 33773 | CVE-2008-3656 | UBUNTU:USN-651-1 | View |
368140 | 33773 | CVE-2008-3656 | URL:http://www.ubuntulinux.org/support/documentation/usn/usn-651-1 | View |
368141 | 33773 | CVE-2008-3656 | CERT:TA09-133A | View |
368142 | 33773 | CVE-2008-3656 | URL:http://www.us-cert.gov/cas/techalerts/TA09-133A.html | View |
368143 | 33773 | CVE-2008-3656 | BID:30644 | View |
368144 | 33773 | CVE-2008-3656 | URL:http://www.securityfocus.com/bid/30644 | View |
368145 | 33773 | CVE-2008-3656 | OVAL:oval:org.mitre.oval:def:9682 | View |
368146 | 33773 | CVE-2008-3656 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9682 | View |
368147 | 33773 | CVE-2008-3656 | SECUNIA:35074 | View |
368148 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/35074 | View |
368149 | 33773 | CVE-2008-3656 | VUPEN:ADV-2008-2334 | View |
368150 | 33773 | CVE-2008-3656 | URL:http://www.vupen.com/english/advisories/2008/2334 | View |
368151 | 33773 | CVE-2008-3656 | SECTRACK:1020654 | View |
368152 | 33773 | CVE-2008-3656 | URL:http://www.securitytracker.com/id?1020654 | View |
368153 | 33773 | CVE-2008-3656 | SECUNIA:31697 | View |
368154 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/31697 | View |
368155 | 33773 | CVE-2008-3656 | SECUNIA:32255 | View |
368156 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/32255 | View |
368157 | 33773 | CVE-2008-3656 | SECUNIA:32256 | View |
368158 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/32256 | View |
368159 | 33773 | CVE-2008-3656 | SECUNIA:33178 | View |
368160 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/33178 | View |
368161 | 33773 | CVE-2008-3656 | SECUNIA:31430 | View |
368162 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/31430 | View |
368163 | 33773 | CVE-2008-3656 | SECUNIA:32165 | View |
368164 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/32165 | View |
368165 | 33773 | CVE-2008-3656 | SECUNIA:32219 | View |
368166 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/32219 | View |
368167 | 33773 | CVE-2008-3656 | SECUNIA:32371 | View |
368168 | 33773 | CVE-2008-3656 | URL:http://secunia.com/advisories/32371 | View |
368169 | 33773 | CVE-2008-3656 | VUPEN:ADV-2009-1297 | View |
368170 | 33773 | CVE-2008-3656 | URL:http://www.vupen.com/english/advisories/2009/1297 | View |
368171 | 33773 | CVE-2008-3656 | XF:ruby-webrick-dos(44371) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
46858 | JVNDB-2008-002168 | PHP の FastCGI モジュールにおけるサービス運用妨害 (DoS) の脆弱性 | PHP には、FastCGI モジュールを使用している場合に、リクエストの処理に不備があるため、サービス運用妨害 (DoS) の脆弱性が存在します。 | CVE-2008-3660 | 33773 | 5 | http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-002168.html | View |