Executive Summary
Summary | |
---|---|
Title | ruby security update |
Informations | |||
---|---|---|---|
Name | RHSA-2005:543 | First vendor Publication | 2005-08-05 |
Vendor | RedHat | Last vendor Modification | 2005-08-05 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated ruby packages that fix an arbitrary command execution issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Ruby is an interpreted scripting language for object-oriented programming. A bug was found in the way Ruby launched an XMLRPC server. If an XMLRPC server is launched in a certain way, it becomes possible for a remote attacker to execute arbitrary commands within the XMLRPC server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1992 to this issue. Users of Ruby should update to these erratum packages, which contain a backported patch and are not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 161095 - CAN-2005-1992 ruby arbitrary command execution on XMLRPC server |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2005-543.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10819 | |||
Oval ID: | oval:org.mitre.oval:def:10819 | ||
Title: | The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands. | ||
Description: | The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-1992 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-10 | Name : SLES9: Security update for ruby File : nvt/sles9p5016692.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-10 (ruby) File : nvt/glsa_200507_10.nasl |
2008-09-04 | Name : FreeBSD Ports: ruby, ruby_static File : nvt/freebsd_ruby1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 748-1 (ruby1.8) File : nvt/deb_748_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
17407 | Ruby XMLRPC Server Unspecified Arbitrary Command Execution Ruby's XMLRPC server module contains a flaw related to the toggling of public_instance_methods from FALSE to TRUE, that may allow an attacker to bypass security restrictions and execute arbitrary code. No further details have been provided. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-773.nasl - Type : ACT_GATHER_INFO |
2006-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2005-543.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-146-1.nasl - Type : ACT_GATHER_INFO |
2005-09-23 | Name : The remote operating system is missing a vendor-supplied patch. File : macosx_SecUpd2005-008.nasl - Type : ACT_GATHER_INFO |
2005-08-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-543.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_594eb447e39811d9a8bd000cf18bbe54.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-118.nasl - Type : ACT_GATHER_INFO |
2005-07-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-748.nasl - Type : ACT_GATHER_INFO |
2005-07-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-10.nasl - Type : ACT_GATHER_INFO |
2005-06-28 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-475.nasl - Type : ACT_GATHER_INFO |
2005-06-22 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-474.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:49:29 |
|