Lucene search

K
ubuntuUbuntuUSN-3685-1
HistoryJun 13, 2018 - 12:00 a.m.

Ruby vulnerabilities

2018-06-1300:00:00
ubuntu.com
47

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.135 Low

EPSS

Percentile

95.6%

Releases

  • Ubuntu 17.10
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • ruby1.9.1 - Object-oriented scripting language
  • ruby2.0 - Object-oriented scripting language
  • ruby2.3 - Object-oriented scripting language

Details

Some of these CVE were already addressed in previous
USN: 3439-1, 3553-1, 3528-1. Here we address for
the remain releases.

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a buffer overrun. (CVE-2017-0898)

It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to overwrite any file on the filesystem.
(CVE-2017-0901)

It was discovered that Ruby was vulnerable to a DNS hijacking vulnerability.
An attacker could use this to possibly force the RubyGems client to download
and install gems from a server that the attacker controls. (CVE-2017-0902)

It was discovered that Ruby incorrectly handled certain YAML files.
An attacker could use this to possibly execute arbitrary code. (CVE-2017-0903)

It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to expose sensitive information.
(CVE-2017-14064)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code. (CVE-2017-10784)

It was discovered that Ruby incorrectly handled certain network requests.
An attacker could possibly use this to inject a crafted key into a HTTP
response. (CVE-2017-17742)

It was discovered that Ruby incorrectly handled certain files.
An attacker could possibly use this to execute arbitrary code.
This update is only addressed to ruby2.0. (CVE-2018-1000074)

It was discovered that Ruby incorrectly handled certain network requests.
An attacker could possibly use this to cause a denial of service.
(CVE-2018-8777)

OSVersionArchitecturePackageVersionFilename
Ubuntu17.10noarchlibruby2.3< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu17.10noarchlibruby2.3-dbgsym< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu17.10noarchruby2.3< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu17.10noarchruby2.3-dbgsym< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu17.10noarchruby2.3-dev< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu17.10noarchruby2.3-doc< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu17.10noarchruby2.3-tcltk< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu17.10noarchruby2.3-tcltk-dbgsym< 2.3.3-1ubuntu1.6UNKNOWN
Ubuntu16.04noarchlibruby2.3< 2.3.1-2~16.04.10UNKNOWN
Ubuntu16.04noarchlibruby2.3-dbg< 2.3.1-2~16.04.10UNKNOWN
Rows per page:
1-10 of 351

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.135 Low

EPSS

Percentile

95.6%