Lucene search

K
debianDebianDEBIAN:DLA-215-1:65755
HistoryApr 30, 2015 - 4:34 p.m.

[SECURITY] [DLA 215-1] libjson-ruby security update

2015-04-3016:34:41
lists.debian.org
13

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.3%

Package : libjson-ruby
Version : 1.1.9-1+deb6u1
CVE ID : CVE-2013-0269

The JSON gem for Ruby allowed remote attackers to cause a denial of
service (resource consumption) or bypass the mass assignment protection
mechanism via a crafted JSON document that triggers the creation of
arbitrary Ruby symbols or certain internal objects, as demonstrated by
conducting a SQL injection attack against Ruby on Rails, aka "Unsafe
Object Creation Vulnerability."

For Debian 6 β€œSqueeze”, this issue has been fixed in libjson-ruby
version 1.1.9-1+deb6u1.

–
RaphaΓ«l Hertzog β—ˆ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.3%