6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
ruby is vulnerable to arbitrary code execution. A flaw was found in the way large amounts of memory were allocated on 64-bit systems when using the BigDecimal class. A context-dependent attacker could use this flaw to cause memory corruption, causing a Ruby application that uses the BigDecimal class to crash or, possibly, execute arbitrary code. This issue did not affect 32-bit systems.
lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
support.apple.com/kb/HT4581
svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364&r2=30993
www.mandriva.com/security/advisories?name=MDVSA-2011:097
www.mandriva.com/security/advisories?name=MDVSA-2011:098
www.redhat.com/support/errata/RHSA-2011-0908.html
www.redhat.com/support/errata/RHSA-2011-0909.html
www.redhat.com/support/errata/RHSA-2011-0910.html
www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/
www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/
www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/
www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/
www.securitytracker.com/id?1025236
access.redhat.com/errata/RHSA-2011:0909
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=682332