Lucene search

K
gentooGentoo FoundationGLSA-200510-05
HistoryOct 06, 2005 - 12:00 a.m.

Ruby: Security bypass vulnerability

2005-10-0600:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.3%

Background

Ruby is an interpreted scripting language for quick and easy object-oriented programming. Ruby supports the safe execution of untrusted code using a safe level and taint flag mechanism.

Description

Dr. Yutaka Oiwa discovered that Ruby fails to properly enforce safe level protections.

Impact

An attacker could exploit this vulnerability to execute arbitrary code beyond the restrictions specified in each safe level.

Workaround

There is no known workaround at this time.

Resolution

All Ruby users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-lang/ruby< 1.8.3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.3%