Lucene search

K
gentooGentoo FoundationGLSA-200611-12
HistoryNov 20, 2006 - 12:00 a.m.

Ruby: Denial of Service vulnerability

2006-11-2000:00:00
Gentoo Foundation
security.gentoo.org
11

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.206 Low

EPSS

Percentile

96.3%

Background

Ruby is a dynamic, open source programming language with a focus on simplicity and productivity.

Description

Zed Shaw, Jeremy Kemper, and Jamis Buck of the Mongrel project reported that the CGI library shipped with Ruby is vulnerable to a remote Denial of Service by an unauthenticated user.

Impact

The vulnerability can be exploited by sending the cgi.rb library an HTTP request with multipart MIME encoding that contains a malformed MIME boundary specifier beginning with “-” instead of “–”. Successful exploitation of the vulnerability causes the library to go into an infinite loop waiting for additional nonexistent input.

Workaround

There is no known workaround at this time.

Resolution

All Ruby users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.5-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-lang/ruby< 1.8.5-r3UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.206 Low

EPSS

Percentile

96.3%