Debian DSA-2809-1: Ruby1.8 security vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | [SECURITY] [DSA 2809-1] ruby1.8 security update | 4 Dec 201321:28 | – | debian |
![]() | [SECURITY] [DSA 2809-1] ruby1.8 security update | 4 Dec 201321:28 | – | debian |
![]() | [SECURITY] [DSA 2738-1] ruby1.9.1 security update | 18 Aug 201316:58 | – | debian |
![]() | [SECURITY] [DSA 2810-1] ruby1.9.1 security update | 4 Dec 201322:29 | – | debian |
![]() | [SECURITY] [DSA 2810-1] ruby1.9.1 security update | 4 Dec 201322:29 | – | debian |
![]() | Debian: Security Advisory (DSA-2809-1) | 3 Dec 201300:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2014:0843-1) | 9 Jun 202100:00 | – | openvas |
![]() | Debian Security Advisory DSA 2809-1 (ruby1.8 - several vulnerabilities) | 4 Dec 201300:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2014:0844-1) | 9 Jun 202100:00 | – | openvas |
![]() | Fedora Update for ruby FEDORA-2013-22423 | 17 Dec 201300:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-2809. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(71220);
script_version("1.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2013-1821", "CVE-2013-4073", "CVE-2013-4164");
script_bugtraq_id(58141, 60843, 63873);
script_xref(name:"DSA", value:"2809");
script_name(english:"Debian DSA-2809-1 : ruby1.8 - several vulnerabilities");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been discovered in the interpreter for
the Ruby language. The Common Vulnerabilities and Exposures project
identifies the following problems :
- CVE-2013-1821
Ben Murphy discovered that unrestricted entity expansion
in REXML can lead to a Denial of Service by consuming
all host memory.
- CVE-2013-4073
William (B.J.) Snow Orvis discovered a vulnerability in
the hostname checking in Ruby's SSL client that could
allow man-in-the-middle attackers to spoof SSL servers
via a crafted certificate issued by a trusted
certification authority.
- CVE-2013-4164
Charlie Somerville discovered that Ruby incorrectly
handled floating point number conversion. If an
application using Ruby accepted untrusted input strings
and converted them to floating point numbers, an
attacker able to provide such input could cause the
application to crash or, possibly, execute arbitrary
code with the privileges of the application."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702526"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714541"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730189"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2013-1821"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2013-4073"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2013-4164"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/squeeze/ruby1.8"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/wheezy/ruby1.8"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2013/dsa-2809"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the ruby1.8 packages.
For the oldstable distribution (squeeze), these problems have been
fixed in version 1.8.7.302-2squeeze2.
For the stable distribution (wheezy), these problems have been fixed
in version 1.8.7.358-7.1+deb7u1."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ruby1.8");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
script_set_attribute(attribute:"patch_publication_date", value:"2013/12/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/05");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"6.0", prefix:"libruby1.8", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"6.0", prefix:"libruby1.8-dbg", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"6.0", prefix:"libtcltk-ruby1.8", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"6.0", prefix:"ri1.8", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"6.0", prefix:"ruby1.8", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"6.0", prefix:"ruby1.8-dev", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"6.0", prefix:"ruby1.8-elisp", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"6.0", prefix:"ruby1.8-examples", reference:"1.8.7.302-2squeeze2")) flag++;
if (deb_check(release:"7.0", prefix:"libruby1.8", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (deb_check(release:"7.0", prefix:"libruby1.8-dbg", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (deb_check(release:"7.0", prefix:"libtcltk-ruby1.8", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (deb_check(release:"7.0", prefix:"ri1.8", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (deb_check(release:"7.0", prefix:"ruby1.8", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (deb_check(release:"7.0", prefix:"ruby1.8-dev", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (deb_check(release:"7.0", prefix:"ruby1.8-examples", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (deb_check(release:"7.0", prefix:"ruby1.8-full", reference:"1.8.7.358-7.1+deb7u1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo