Lucene search

K
ubuntuUbuntuUSN-195-1
HistoryOct 10, 2005 - 12:00 a.m.

Ruby vulnerability

2005-10-1000:00:00
ubuntu.com
46

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.1

Confidence

Low

EPSS

0.021

Percentile

89.3%

Releases

  • Ubuntu 5.04
  • Ubuntu 4.10

Details

The object oriented scripting language Ruby supports safely executing
untrusted code with two mechanisms: safe level and taint flag on
objects. Dr. Yutaka Oiwa discovered a vulnerability that allows
Ruby methods to bypass these mechanisms. In systems which use this
feature, this could be exploited to execute Ruby code beyond the
restrictions specified in each safe level.

OSVersionArchitecturePackageVersionFilename
Ubuntu5.04noarchruby1.8< *UNKNOWN
Ubuntu4.10noarchruby1.8< *UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.1

Confidence

Low

EPSS

0.021

Percentile

89.3%