CVE-2015-4411
moderate-risk
Published 2020-02-20
The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410.
Do I need to act?
~
3.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (28)
Third Party Advisory
http://www.securityfocus.com/bid/75045
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1229706
Mailing List
https://seclists.org/oss-sec/2015/q2/653
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2015-4411
Third Party Advisory
https://www.securityfocus.com/bid/75045
Third Party Advisory
http://www.securityfocus.com/bid/75045
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1229706
and 8 more references
42
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
7/34 · Low
Exposure
9/34 · Low