Lucene search

K
certCERTVU:684913
HistoryOct 03, 2005 - 12:00 a.m.

Ruby library contains vulnerable default value

2005-10-0300:00:00
www.kb.cert.org
18

0.039 Low

EPSS

Percentile

91.9%

Overview

Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code.

Description

Ruby is vulnerable to an attack on applications using the XML-RPC services via XMLRPC.iPIMethods, due to an insecure default value in utils.rb. Any program or application using the XML-RPC services provided by XMLRPC.iPIMethods may be affected. Due to the vulnerability occurring in code that is typically used to provide remote services, this may allow a remote attacker to execute arbitrary code.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code.


Solution

Apply an update

Please see the Ruby XMLRPC.iPIMethods Vulnerability note for more information, or contact your vendor for an update.


Vendor Information

684913

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Red Hat, Inc. __ Affected

Updated: October 18, 2005

Status

Affected

Vendor Statement

This issue did not affect the Ruby packages in Red Hat Enterprise Linux 2.1, or 3.

Updated Ruby packages for Red Hat Enterprise Linux 4 to correct this issue are available at the URL below and by using the Red Hat Network ‘up2date’ tool.

<http://rhn.redhat.com/errata/RHSA-2005-543.html&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Ruby __ Affected

Updated: October 03, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the Ruby XMLRPC.iPIMethods Vulnerability note for more information.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23684913 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Nobuhiro IMAI for reporting this vulnerability.

This document was written by Ken MacInnis.

Other Information

CVE IDs: CVE-2005-1992
Severity Metric: 9.11 Date Public: