Lucene search

K
amazonAmazonALAS-2015-547
HistoryJun 16, 2015 - 10:30 a.m.

Medium: ruby20

2015-06-1610:30:00
alas.aws.amazon.com
20

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

82.0%

Issue Overview:

RubyGems provides the ability of a domain to direct clients to a separate host that is used to fetch gems and make API calls against. This mechanism is implemented via DNS, specificly a SRV record _rubygems._tcp under the original requested domain. RubyGems did not validate the hostname returned in the SRV record before sending requests to it. (CVE-2015-3900)

As discussed upstream (https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478), CVE-2015-4020 is due to an incomplete fix for CVE-2015-3900, which allowed redirection to an arbitrary gem server in any security domain.

Affected Packages:

ruby20

Issue Correction:
Run yum update ruby20 to update your system.

New Packages:

i686:  
    ruby20-2.0.0.645-1.27.amzn1.i686  
    ruby20-devel-2.0.0.645-1.27.amzn1.i686  
    ruby20-debuginfo-2.0.0.645-1.27.amzn1.i686  
    rubygem20-io-console-0.4.2-1.27.amzn1.i686  
    rubygem20-bigdecimal-1.2.0-1.27.amzn1.i686  
    ruby20-libs-2.0.0.645-1.27.amzn1.i686  
    rubygem20-psych-2.0.0-1.27.amzn1.i686  
  
noarch:  
    rubygems20-devel-2.0.14-1.27.amzn1.noarch  
    rubygems20-2.0.14-1.27.amzn1.noarch  
    ruby20-irb-2.0.0.645-1.27.amzn1.noarch  
    ruby20-doc-2.0.0.645-1.27.amzn1.noarch  
  
src:  
    ruby20-2.0.0.645-1.27.amzn1.src  
  
x86_64:  
    ruby20-debuginfo-2.0.0.645-1.27.amzn1.x86_64  
    rubygem20-psych-2.0.0-1.27.amzn1.x86_64  
    ruby20-libs-2.0.0.645-1.27.amzn1.x86_64  
    ruby20-devel-2.0.0.645-1.27.amzn1.x86_64  
    ruby20-2.0.0.645-1.27.amzn1.x86_64  
    rubygem20-bigdecimal-1.2.0-1.27.amzn1.x86_64  
    rubygem20-io-console-0.4.2-1.27.amzn1.x86_64  

Additional References

Red Hat: CVE-2015-3900, CVE-2015-4020

Mitre: CVE-2015-3900, CVE-2015-4020

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

82.0%