CVE-2018-8777

CVSS v3.0 7.5 (High)
75% Progress
CVSS v2.0 5 (Medium)
50% Progress
EPSS 0.76 % (82th)
0.76% Progress
Affected Products 4
Advisories 15

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).

Weaknesses
CWE-400
Uncontrolled Resource Consumption
CVE Status
PUBLISHED
CNA
MITRE
Published Date
2018-04-03 22:29:00
(6 years ago)
Updated Date
2019-07-21 12:15:15
(5 years ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Ruby-lang Ruby from 2.2.0 version and prior 2.2.10 version cpe:2.3:a:ruby-lang:ruby >= 2.2.0 < 2.2.10
  Ruby-lang Ruby from 2.3.0 version and prior 2.3.7 version cpe:2.3:a:ruby-lang:ruby >= 2.3.0 < 2.3.7
  Ruby-lang Ruby from 2.4.0 version and prior 2.4.4 version cpe:2.3:a:ruby-lang:ruby >= 2.4.0 < 2.4.4
  Ruby-lang Ruby from 2.5.0 version and prior 2.5.1 version cpe:2.3:a:ruby-lang:ruby >= 2.5.0 < 2.5.1
  Ruby-lang Ruby 2.6.0 Preview1 cpe:2.3:a:ruby-lang:ruby:2.6.0:preview1

Configuration #2

    CPE23 From Up To
  Debian Linux 7.0 cpe:2.3:o:debian:debian_linux:7.0
  Debian Linux 8.0 cpe:2.3:o:debian:debian_linux:8.0
  Debian Linux 9.0 cpe:2.3:o:debian:debian_linux:9.0

Configuration #3

    CPE23 From Up To
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts
  Canonical Ubuntu Linux 16.04 cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts
  Canonical Ubuntu Linux 17.10 cpe:2.3:o:canonical:ubuntu_linux:17.10

Configuration #4

    CPE23 From Up To
  Redhat Enterprise Linux 6.0 cpe:2.3:o:redhat:enterprise_linux:6.0
  Redhat Enterprise Linux 7.0 cpe:2.3:o:redhat:enterprise_linux:7.0
  Redhat Enterprise Linux 7.4 cpe:2.3:o:redhat:enterprise_linux:7.4
  Redhat Enterprise Linux 7.5 cpe:2.3:o:redhat:enterprise_linux:7.5
  Redhat Enterprise Linux 7.6 cpe:2.3:o:redhat:enterprise_linux:7.6
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...