CVE-2013-4363Inefficient Algorithmic Complexity in Rubygems

Severity
4.3MEDIUMNVD
EPSS
0.6%
top 30.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 17
Latest updateMay 17

Description

Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

Debianrubygems/rubygems< 3.2.0~rc.1-1+3
NVDrubygems/rubygems1.8.23+41
NVDruby-lang/ruby6 versions+5

Patches

🔴Vulnerability Details

4
GHSA
RubyGems Regular Expression Denial of Service2022-05-17
OSV
RubyGems Regular Expression Denial of Service2022-05-17
OSV
CVE-2013-4363: Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version2013-10-17
CVEList
CVE-2013-4363: Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version2013-10-17

📋Vendor Advisories

2
Red Hat
rubygems: version regex algorithmic complexity vulnerability, incomplete CVE-2013-4287 fix2013-09-15
Debian
CVE-2013-4363: rubygems - Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN i...2013

💬Community

1
Bugzilla
CVE-2013-4363 rubygems: version regex algorithmic complexity vulnerability, incomplete CVE-2013-4287 fix2013-09-19
CVE-2013-4363 — Inefficient Algorithmic Complexity | cvebase