CVE-2009-3086
08.09.2009, 18:30
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.Enginsight
Vendor | Product | Version |
---|---|---|
rubyonrails | rails | 2.1.0 |
rubyonrails | rails | 2.1.1 |
rubyonrails | rails | 2.1.2 |
rubyonrails | rails | 2.2.0 |
rubyonrails | rails | 2.2.1 |
rubyonrails | rails | 2.2.2 |
rubyonrails | rails | 2.3.2 |
rubyonrails | rails | 2.3.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References