LWN.net Logo

fuse-esb: denial of service

Package(s):fuse-esb CVE #(s):CVE-2012-5370
Created:December 21, 2012 Updated:January 4, 2013
Description:

From the Red Hat advisory:

A denial of service flaw was found in the implementation of associative arrays (hashes) in JRuby. An attacker able to supply a large number of inputs to a JRuby application (such as HTTP POST request parameters sent to a web application) that are used as keys when inserting data into an array could trigger multiple hash function collisions, making array operations take an excessive amount of CPU time. To mitigate this issue, the Murmur hash function has been replaced with the Perl hash function. (CVE-2012-5370)

Note: Fuse ESB Enterprise 7.0.2 ships JRuby as part of the camel-ruby component, which allows users to define Camel routes in Ruby. The default use of JRuby in Fuse ESB Enterprise 7.0.2 does not appear to expose this flaw. If the version of JRuby shipped with Fuse ESB Enterprise 7.0.2 was used to build a custom application, then this flaw could be exposed.

Alerts:
Red Hat RHSA-2012:1604-01 2012-12-21

(Log in to post comments)

fuse-esb: denial of service

Posted Jan 4, 2013 9:49 UTC (Fri) by epa (subscriber, #39769) [Link]

They have replaced Murmurhash (which is known to have collision vulnerabilities) with 'the Perl hash function'. But Perl is moving away from its current hashing to use SipHash instead, at least on 64-bit platforms. The existing Perl hash function ('natatime') is believed to be better than Murmurhash, but not ideal.

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds