Vulnerabilities > CVE-2012-3514 - Cryptographic Issues vulnerability in Nicolas Cannasse Ocaml Xml-Light Library R233

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

OCaml Xml-Light Library before r234 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via unspecified vectors.

Vulnerable Configurations

Part Description Count
Application
Nicolas_Cannasse
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-12500.NASL
    descriptionFix for CVE-2012-3514. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-08-31
    plugin id61738
    published2012-08-31
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61738
    titleFedora 17 : ocaml-xml-light-2.3-0.1.svn234.fc17 (2012-12500)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-12392.NASL
    descriptionFix for CVE-2012-3514 moderate impact hash table collisions. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-09-18
    plugin id62137
    published2012-09-18
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/62137
    titleFedora 18 : ocaml-xml-light-2.3-0.1.svn234.fc18 (2012-12392)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2013-107.NASL
    descriptionUpdated ocaml-xml-light packages fix security vulnerability : OCaml Xml-Light Library before r234 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via unspecified vectors (CVE-2012-3514).
    last seen2020-06-01
    modified2020-06-02
    plugin id66119
    published2013-04-20
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66119
    titleMandriva Linux Security Advisory : ocaml-xml-light (MDVSA-2013:107)