Input validation error in Fedora - CVE-2015-4411
Published: February 20, 2020 / Updated: August 8, 2020
Vulnerability identifier: #VU34816
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-4411
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Fedoraproject
Affected software:
Fedora
Fedora
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (worker resource consumption) via a crafted string.
How to mitigate CVE-2015-4411
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html
- http://www.openwall.com/lists/oss-security/2015/06/06/3
- http://www.securityfocus.com/bid/75045
- https://bugzilla.redhat.com/show_bug.cgi?id=1229706
- https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999
- https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191
- https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7
- https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24
- https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html
- https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html
- https://seclists.org/oss-sec/2015/q2/653
- https://security-tracker.debian.org/tracker/CVE-2015-4411
- https://www.securityfocus.com/bid/75045