The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1651-1 | New ruby1.8 packages fix several vulnerabilities |
![]() |
DSA-1652-1 | New ruby1.9 packages fix several vulnerabilities |
![]() |
USN-651-1 | Ruby vulnerabilities |
![]() |
USN-691-1 | Ruby vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:52:59.694Z
Reserved: 2008-08-26T00:00:00
Link: CVE-2008-3790

No data.

Status : Deferred
Published: 2008-08-27T20:41:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-3790


No data.