Lucene search

K
amazonAmazonALAS-2013-248
HistoryNov 22, 2013 - 9:42 p.m.

Critical: ruby

2013-11-2221:42:00
alas.aws.amazon.com
15

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.4%

Issue Overview:

Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.

Affected Packages:

ruby

Issue Correction:
Run yum update ruby to update your system.

New Packages:

i686:  
    ruby-debuginfo-1.8.7.374-2.11.amzn1.i686  
    ruby-devel-1.8.7.374-2.11.amzn1.i686  
    ruby-1.8.7.374-2.11.amzn1.i686  
    ruby-libs-1.8.7.374-2.11.amzn1.i686  
    ruby-static-1.8.7.374-2.11.amzn1.i686  
    ruby-ri-1.8.7.374-2.11.amzn1.i686  
  
noarch:  
    ruby-rdoc-1.8.7.374-2.11.amzn1.noarch  
    ruby-irb-1.8.7.374-2.11.amzn1.noarch  
  
src:  
    ruby-1.8.7.374-2.11.amzn1.src  
  
x86_64:  
    ruby-debuginfo-1.8.7.374-2.11.amzn1.x86_64  
    ruby-devel-1.8.7.374-2.11.amzn1.x86_64  
    ruby-libs-1.8.7.374-2.11.amzn1.x86_64  
    ruby-ri-1.8.7.374-2.11.amzn1.x86_64  
    ruby-static-1.8.7.374-2.11.amzn1.x86_64  
    ruby-1.8.7.374-2.11.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-4164

Mitre: CVE-2013-4164

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.4%