5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.011 Low
EPSS
Percentile
84.3%
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0
before revision r37068 allows context-dependent attackers to bypass
safe-level restrictions and modify untainted strings via the
name_err_mesg_to_str API function, which marks the string as tainted, a
different vulnerability than CVE-2011-1005.
Author | Note |
---|---|
tyhicks | affects 1.8.x, as well as 1.9.3-p0 and newer |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | ruby1.8 | < 1.8.7.249-2ubuntu0.2 | UNKNOWN |
ubuntu | 11.04 | noarch | ruby1.8 | < 1.8.7.302-2ubuntu0.2 | UNKNOWN |
ubuntu | 11.10 | noarch | ruby1.8 | < 1.8.7.352-2ubuntu0.2 | UNKNOWN |
ubuntu | 12.04 | noarch | ruby1.8 | < 1.8.7.352-2ubuntu1.1 | UNKNOWN |
ubuntu | 12.10 | noarch | ruby1.8 | < 1.8.7.358-4ubuntu0.1 | UNKNOWN |
ubuntu | 12.04 | noarch | ruby1.9.1 | < 1.9.3.0-1ubuntu2.3 | UNKNOWN |
ubuntu | 12.10 | noarch | ruby1.9.1 | < 1.9.3.194-1ubuntu1.1 | UNKNOWN |
www.openwall.com/lists/oss-security/2012/10/03
www.openwall.com/lists/oss-security/2012/10/03/9
launchpad.net/bugs/cve/CVE-2012-4466
nvd.nist.gov/vuln/detail/CVE-2012-4466
security-tracker.debian.org/tracker/CVE-2012-4466
ubuntu.com/security/notices/USN-1602-1
ubuntu.com/security/notices/USN-1603-1
ubuntu.com/security/notices/USN-1603-2
ubuntu.com/security/notices/USN-1614-1
www.cve.org/CVERecord?id=CVE-2012-4466