Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
Related vulnerabilities
GSD-2013-0183
Vulnerability from gsd - Updated: 2013-01-07 00:00Details
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2013-0183",
"description": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.",
"id": "GSD-2013-0183",
"references": [
"https://www.suse.com/security/cve/CVE-2013-0183.html",
"https://www.debian.org/security/2013/dsa-2783",
"https://access.redhat.com/errata/RHSA-2013:0548",
"https://access.redhat.com/errata/RHSA-2013:0544"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "rack",
"purl": "pkg:gem/rack"
}
}
],
"aliases": [
"CVE-2013-0183",
"OSVDB-89320"
],
"details": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.",
"id": "GSD-2013-0183",
"modified": "2013-01-07T00:00:00.000Z",
"published": "2013-01-07T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 5.0,
"type": "CVSS_V2"
}
],
"summary": "CVE-2013-0183 rubygem-rack: receiving excessively long lines triggers out-of-memory error"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0183",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-0544.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-0548.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html"
},
{
"name": "http://www.debian.org/security/2013/dsa-2783",
"refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2783"
},
{
"name": "http://rack.github.com/",
"refsource": "MISC",
"url": "http://rack.github.com/"
},
{
"name": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff",
"refsource": "MISC",
"url": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff"
},
{
"name": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18",
"refsource": "MISC",
"url": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18"
},
{
"name": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI",
"refsource": "MISC",
"url": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI"
},
{
"name": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs",
"refsource": "MISC",
"url": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=895282",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2013-0183",
"cvss_v2": 5.0,
"date": "2013-01-07",
"description": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.",
"gem": "rack",
"osvdb": 89320,
"patched_versions": [
"~\u003e 1.3.8",
"\u003e= 1.4.3"
],
"title": "CVE-2013-0183 rubygem-rack: receiving excessively long lines triggers out-of-memory error",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=1.3.0 \u003c=1.4.2",
"affected_versions": "All versions starting from 1.3.0 up to 1.4.2",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-119",
"CWE-937"
],
"date": "2018-08-13",
"description": "multipart/parser.rb in Rack allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.",
"fixed_versions": [
"1.4.3"
],
"identifier": "CVE-2013-0183",
"identifiers": [
"CVE-2013-0183"
],
"not_impacted": "All versions before 1.3.0, all versions after 1.4.2",
"package_slug": "gem/rack",
"pubdate": "2013-03-01",
"solution": "Upgrade to version 1.4.3 or above.",
"title": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2013-0183",
"http://rack.github.com/",
"http://rhn.redhat.com/errata/RHSA-2013-0548.html",
"https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff",
"https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18",
"https://bugzilla.redhat.com/show_bug.cgi?id=895282",
"http://rhn.redhat.com/errata/RHSA-2013-0544.html",
"http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html",
"http://www.debian.org/security/2013/dsa-2783",
"https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI",
"https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs"
],
"uuid": "50e54305-7579-48c4-983c-6e140959d093"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0183"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rack.github.com/",
"refsource": "CONFIRM",
"tags": [],
"url": "http://rack.github.com/"
},
{
"name": "RHSA-2013:0548",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html"
},
{
"name": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff",
"refsource": "CONFIRM",
"tags": [],
"url": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff"
},
{
"name": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18",
"refsource": "CONFIRM",
"tags": [],
"url": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=895282",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282"
},
{
"name": "RHSA-2013:0544",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
},
{
"name": "openSUSE-SU-2013:0462",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
},
{
"name": "DSA-2783",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2783"
},
{
"name": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs",
"refsource": "MISC",
"tags": [],
"url": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs"
},
{
"name": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI",
"refsource": "MISC",
"tags": [],
"url": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T04:38Z",
"publishedDate": "2013-03-01T05:40Z"
}
}
}