Lucene search

K
amazonAmazonALAS-2012-139
HistoryOct 23, 2012 - 10:43 a.m.

Medium: ruby

2012-10-2310:43:00
alas.aws.amazon.com
17

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.011 Low

EPSS

Percentile

84.3%

Issue Overview:

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

Affected Packages:

ruby

Issue Correction:
Run yum update ruby to update your system.

New Packages:

i686:  
    ruby-libs-1.8.7.371-1.20.amzn1.i686  
    ruby-1.8.7.371-1.20.amzn1.i686  
    ruby-debuginfo-1.8.7.371-1.20.amzn1.i686  
    ruby-devel-1.8.7.371-1.20.amzn1.i686  
    ruby-ri-1.8.7.371-1.20.amzn1.i686  
    ruby-static-1.8.7.371-1.20.amzn1.i686  
  
noarch:  
    ruby-irb-1.8.7.371-1.20.amzn1.noarch  
    ruby-rdoc-1.8.7.371-1.20.amzn1.noarch  
  
src:  
    ruby-1.8.7.371-1.20.amzn1.src  
  
x86_64:  
    ruby-debuginfo-1.8.7.371-1.20.amzn1.x86_64  
    ruby-devel-1.8.7.371-1.20.amzn1.x86_64  
    ruby-ri-1.8.7.371-1.20.amzn1.x86_64  
    ruby-libs-1.8.7.371-1.20.amzn1.x86_64  
    ruby-1.8.7.371-1.20.amzn1.x86_64  
    ruby-static-1.8.7.371-1.20.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-4466

Mitre: CVE-2012-4466

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.011 Low

EPSS

Percentile

84.3%