Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-2734
HistoryApr 24, 2014 - 12:00 a.m.

CVE-2014-2734

2014-04-2400:00:00
ubuntu.com
ubuntu.com
11

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.032 Low

EPSS

Percentile

91.2%

DISPUTED The openssl extension in Ruby 2.x does not properly maintain
the state of process memory after a file is reopened, which allows remote
attackers to spoof signatures within the context of a Ruby script that
attempts signature verification after performing a certain sequence of
filesystem operations. NOTE: this issue has been disputed by the Ruby
OpenSSL team and third parties, who state that the original demonstration
PoC contains errors and redundant or unnecessarily-complex code that does
not appear to be related to a demonstration of the issue. As of 20140502,
CVE is not aware of any public comment by the original researcher.

Bugs

Notes

Author Note
mdeslaur this is disputed

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.032 Low

EPSS

Percentile

91.2%

Related for UB:CVE-2014-2734