CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
89.4%
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
ruby: DoS by large request in WEBrick (CVE-2018-8777)
ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780)
rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073)
rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074)
rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076)
rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077)
rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078)
rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079)
rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | noarch | ruby-irb | < 2.0.0.648-36.el7_6 | ruby-irb-2.0.0.648-36.el7_6.noarch.rpm |
RedHat | 7 | ppc64le | rubygem-bigdecimal | < 1.2.0-36.el7_6 | rubygem-bigdecimal-1.2.0-36.el7_6.ppc64le.rpm |
RedHat | 7 | i686 | ruby-debuginfo | < 2.0.0.648-36.el7_6 | ruby-debuginfo-2.0.0.648-36.el7_6.i686.rpm |
RedHat | 7 | s390x | ruby-devel | < 2.0.0.648-36.el7_6 | ruby-devel-2.0.0.648-36.el7_6.s390x.rpm |
RedHat | 7 | x86_64 | rubygem-psych | < 2.0.0-36.el7_6 | rubygem-psych-2.0.0-36.el7_6.x86_64.rpm |
RedHat | 7 | x86_64 | ruby-devel | < 2.0.0.648-36.el7_6 | ruby-devel-2.0.0.648-36.el7_6.x86_64.rpm |
RedHat | 7 | ppc64le | ruby-devel | < 2.0.0.648-36.el7_6 | ruby-devel-2.0.0.648-36.el7_6.ppc64le.rpm |
RedHat | 7 | aarch64 | rubygem-json | < 1.7.7-36.el7_6 | rubygem-json-1.7.7-36.el7_6.aarch64.rpm |
RedHat | 7 | ppc64 | ruby-devel | < 2.0.0.648-36.el7_6 | ruby-devel-2.0.0.648-36.el7_6.ppc64.rpm |
RedHat | 7 | ppc64 | rubygem-json | < 1.7.7-36.el7_6 | rubygem-json-1.7.7-36.el7_6.ppc64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
89.4%