Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2012-5370
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
JRuby ‘MurmurHash2’算法哈希冲突拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
JRuby是面向Ruby、基于Java虚拟机(JVM)的一种解释程序。 JRuby中存在拒绝服务漏洞,该漏洞源于使用哈希函数基于‘MurmurHash2’算法,可预测哈希值冲突。攻击者利用该漏洞发送特制的字符串传送到受影响应用程序,使用这些字符串创建Hash对象(类似HTTP请求)。成功的利用可触发高CPU消耗,导致拒绝访问状态。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2012-5370
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2012-5370
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2012-5370

No comments yet


Leave a comment