Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-3656

Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.671
EPSS Ranking 98.4%
CVSS Severity
CVSS v2 Score 7.8
References
Products affected by CVE-2008-3656
  • Ruby-Lang » Ruby » Version: N/A
    cpe:2.3:a:ruby-lang:ruby:-
  • Ruby-Lang » Ruby » Version: 1.6.8
    cpe:2.3:a:ruby-lang:ruby:1.6.8
  • Ruby-Lang » Ruby » Version: 1.8
    cpe:2.3:a:ruby-lang:ruby:1.8
  • Ruby-Lang » Ruby » Version: 1.8.0
    cpe:2.3:a:ruby-lang:ruby:1.8.0
  • Ruby-Lang » Ruby » Version: 1.8.1
    cpe:2.3:a:ruby-lang:ruby:1.8.1
  • Ruby-Lang » Ruby » Version: 1.8.2
    cpe:2.3:a:ruby-lang:ruby:1.8.2
  • Ruby-Lang » Ruby » Version: 1.8.3
    cpe:2.3:a:ruby-lang:ruby:1.8.3
  • Ruby-Lang » Ruby » Version: 1.8.4
    cpe:2.3:a:ruby-lang:ruby:1.8.4
  • Ruby-Lang » Ruby » Version: 1.8.5
    cpe:2.3:a:ruby-lang:ruby:1.8.5
  • Ruby-Lang » Ruby » Version: 1.8.6
    cpe:2.3:a:ruby-lang:ruby:1.8.6
  • Ruby-Lang » Ruby » Version: 1.8.7
    cpe:2.3:a:ruby-lang:ruby:1.8.7
  • Ruby-Lang » Ruby » Version: 1.9.0
    cpe:2.3:a:ruby-lang:ruby:1.9.0


Contact Us

Shodan ® - All rights reserved