CVE-2009-3086

A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
VendorProductVersion
rubyonrailsrails
2.1.0
rubyonrailsrails
2.1.1
rubyonrailsrails
2.1.2
rubyonrailsrails
2.2.0
rubyonrailsrails
2.2.1
rubyonrailsrails
2.2.2
rubyonrailsrails
2.3.2
rubyonrailsrails
2.3.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rails
bullseye
2:6.0.3.7+dfsg-2+deb11u2
fixed
bullseye (security)
2:6.0.3.7+dfsg-2+deb11u2
fixed
etch
no-dsa
bookworm
2:6.1.7.3+dfsg-2~deb12u1
fixed
sid
2:6.1.7.3+dfsg-4
fixed
trixie
2:6.1.7.3+dfsg-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rails
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
ignored
intrepid
ignored
hardy
not-affected
dapper
not-affected