Unrated severityNVD Advisory· Published Nov 28, 2012· Updated Apr 29, 2026
CVE-2012-5373
CVE-2012-5373
Description
Oracle Java SE 7 and earlier, and OpenJDK 7 and earlier, computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm, a different vulnerability than CVE-2012-2739.
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- 2012.appsec-forum.ch/conferences/nvd
- asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdfnvd
- www.ocert.org/advisories/ocert-2012-001.htmlnvd
- www.securityfocus.com/bid/56673nvd
- bugzilla.redhat.com/show_bug.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/80299nvd
- www.131002.net/data/talks/appsec12_slides.pdfnvd
News mentions
0No linked articles in our index yet.