VYPR
Unrated severityNVD Advisory· Published Aug 27, 2008· Updated Apr 23, 2026

CVE-2008-3790

CVE-2008-3790

Description

The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."

Affected products

21
  • Ruby Lang/Ruby21 versions
    cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*+ 20 more
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:p287:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:p72:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

35

News mentions

0

No linked articles in our index yet.