CVE-2015-4411

The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/06/06/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/75045 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1229706 Issue Tracking Third Party Advisory
https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999 Patch
https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191 Patch
https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7 Patch
https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24 Patch
https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html Exploit Third Party Advisory
https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html Exploit Third Party Advisory
https://seclists.org/oss-sec/2015/q2/653 Mailing List Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2015-4411 Third Party Advisory
https://www.securityfocus.com/bid/75045 Third Party Advisory VDB Entry
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/06/06/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/75045 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1229706 Issue Tracking Third Party Advisory
https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999 Patch
https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191 Patch
https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7 Patch
https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24 Patch
https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html Exploit Third Party Advisory
https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html Exploit Third Party Advisory
https://seclists.org/oss-sec/2015/q2/653 Mailing List Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2015-4411 Third Party Advisory
https://www.securityfocus.com/bid/75045 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:mongodb:bson:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

History

21 Nov 2024, 02:31

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/06/06/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/06/06/3 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/75045 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/75045 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1229706 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1229706 - Issue Tracking, Third Party Advisory
References () https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999 - Patch () https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999 - Patch
References () https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191 - Patch () https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191 - Patch
References () https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7 - Patch () https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7 - Patch
References () https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24 - Patch () https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24 - Patch
References () https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html - Exploit, Third Party Advisory () https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html - Exploit, Third Party Advisory
References () https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html - Exploit, Third Party Advisory () https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html - Exploit, Third Party Advisory
References () https://seclists.org/oss-sec/2015/q2/653 - Mailing List, Third Party Advisory () https://seclists.org/oss-sec/2015/q2/653 - Mailing List, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2015-4411 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2015-4411 - Third Party Advisory
References () https://www.securityfocus.com/bid/75045 - Third Party Advisory, VDB Entry () https://www.securityfocus.com/bid/75045 - Third Party Advisory, VDB Entry

Information

Published : 2020-02-20 17:15

Updated : 2024-11-21 02:31


NVD link : CVE-2015-4411

Mitre link : CVE-2015-4411

CVE.ORG link : CVE-2015-4411


JSON object : View

Products Affected

fedoraproject

  • fedora

mongodb

  • bson
CWE
CWE-400

Uncontrolled Resource Consumption