Lucene search

K
gentooGentoo FoundationGLSA-200510-05
HistoryOct 06, 2005 - 12:00 a.m.

Ruby: Security bypass vulnerability

2005-10-0600:00:00
Gentoo Foundation
security.gentoo.org
14

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.021

Percentile

89.3%

Background

Ruby is an interpreted scripting language for quick and easy object-oriented programming. Ruby supports the safe execution of untrusted code using a safe level and taint flag mechanism.

Description

Dr. Yutaka Oiwa discovered that Ruby fails to properly enforce safe level protections.

Impact

An attacker could exploit this vulnerability to execute arbitrary code beyond the restrictions specified in each safe level.

Workaround

There is no known workaround at this time.

Resolution

All Ruby users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-lang/ruby< 1.8.3UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.021

Percentile

89.3%