CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
There is a unintentional socket creation vulnerability in UNIXServer.open
method of socket library bundled with Ruby. And there is also a unintentional
socket access vulnerability in UNIXSocket.open
method.
UNIXServer.open
accepts the path of the socket to be created at the first
parameter. If the path contains NUL (\0
) bytes, this method recognize that
the path is completed before the NUL bytes. So, if a script accepts an external
input as the argument of this method, the attacker can make the socket file in
the unintentional path. And, UNIXSocket.open
also accepts the path of the
socket to be created at the first parameter without checking NUL bytes like
UNIXServer.open
. So, if a script accepts an external input as the argument of
this method, the attacker can accepts the socket file in the unintentional
path.
All users running an affected release should upgrade immediately.
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N