Vulnerability CVE-2012-0840


Published: 2012-02-10   Modified: 2012-02-13

Description:
tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Apache -> Portable runtime 

 References:
http://mail-archives.apache.org/mod_mbox/apr-commits/201201.mbox/%3C20120115003715.071D423888FD@eris.apache.org%3E
http://openwall.com/lists/oss-security/2012/02/08/3
http://openwall.com/lists/oss-security/2012/02/09/1
http://svn.apache.org/viewvc?rev=1231605&view=rev
http://www.mail-archive.com/dev%40apr.apache.org/msg24439.html
http://www.mail-archive.com/dev%40apr.apache.org/msg24472.html
http://www.mail-archive.com/dev%40apr.apache.org/msg24473.html
http://www.mandriva.com/security/advisories?name=MDVSA-2012:019
https://exchange.xforce.ibmcloud.com/vulnerabilities/73096

Copyright 2021, cxsecurity.com

 

Back to Top