CVE-2009-3086
08.09.2009, 18:30
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.Enginsight
| Vendor | Product | Version |
|---|---|---|
| rubyonrails | rails | 2.1.0 |
| rubyonrails | rails | 2.1.1 |
| rubyonrails | rails | 2.1.2 |
| rubyonrails | rails | 2.2.0 |
| rubyonrails | rails | 2.2.1 |
| rubyonrails | rails | 2.2.2 |
| rubyonrails | rails | 2.3.2 |
| rubyonrails | rails | 2.3.3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References