Lucene search

K
osvGoogleOSV:DLA-235-1
HistoryMay 30, 2015 - 12:00 a.m.

ruby1.9.1 - security update

2015-05-3000:00:00
Google
osv.dev
11

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.029 Low

EPSS

Percentile

89.3%

  • CVE-2011-0188
    The VpMemAlloc function in bigdecimal.c in the BigDecimal class in
    Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7
    and other platforms, does not properly allocate memory, which allows
    context-dependent attackers to execute arbitrary code or cause a
    denial of service (application crash) via vectors involving creation
    of a large BigDecimal value within a 64-bit process, related to an
    β€œinteger truncation issue.”
  • CVE-2011-2705
    use upstream SVN r32050 to modify PRNG state to prevent random number
    sequence repeatation at forked child process which has same pid.
    Reported by Eric Wong.
  • CVE-2012-4522
    The rb_get_path_check function in file.c in Ruby 1.9.3 before
    patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent
    attackers to create files in unexpected locations or with unexpected
    names via a NUL byte in a file path.
  • CVE-2013-0256
    darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before
    4.0.0.preview2.1, as used in Ruby, does not properly generate
    documents, which allows remote attackers to conduct cross-site
    scripting (XSS) attacks via a crafted URL.
  • CVE-2013-2065
    (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426,
    and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for
    native functions, which allows context-dependent attackers to bypass
    intended $SAFE level restrictions.
  • CVE-2015-1855
    OpenSSL extension hostname matching implementation violates RFC 6125

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.029 Low

EPSS

Percentile

89.3%