Executive Summary

Summary
Title ruby193-ruby security update
Informations
Name RHSA-2013:1103 First vendor Publication 2013-07-23
Vendor RedHat Last vendor Modification 2013-07-23
Severity (Vendor) Moderate Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated ruby193-ruby packages that fix one security issue are now available for Red Hat OpenStack 3.0 (Grizzly).

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

2. Relevant releases/architectures:

OpenStack 3 - noarch, x86_64

3. Description:

Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Red Hat OpenStack makes use of Puppet, which is written in Ruby.

A flaw was found in Ruby's SSL client's hostname identity check when handling certificates that contain hostnames with NULL bytes. An attacker could potentially exploit this flaw to conduct a man-in-the-middle attack against the Puppet master and its clients. Note that to exploit this issue, an attacker would need to get a carefully-crafted certificate signed by an authority that the Puppet master and clients trust. (CVE-2013-4073)

Users of Red Hat OpenStack 3.0 (Grizzly) are advised to upgrade to these updated packages, which correct this issue. After installing the update, the puppetmaster service must be restarted on the Puppet master server, and the puppet service must be restarted on all clients that run the Puppet agent as a daemon.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

979251 - CVE-2013-4073 ruby: hostname check bypassing vulnerability in SSL client

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2013-1103.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-310 Cryptographic Issues

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18009
 
Oval ID: oval:org.mitre.oval:def:18009
Title: USN-1902-1 -- ruby1.8, ruby1.9.1 vulnerability
Description: An attacker could trick Ruby into trusting a rogue server.
Family: unix Class: patch
Reference(s): USN-1902-1
CVE-2013-4073
Version: 7
Platform(s): Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Product(s): ruby1.8
ruby1.9.1
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18691
 
Oval ID: oval:org.mitre.oval:def:18691
Title: DSA-2738-1 ruby1.9.1 - several
Description: Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to denial of service and other security problems.
Family: unix Class: patch
Reference(s): DSA-2738-1
CVE-2013-1821
CVE-2013-4073
Version: 8
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): ruby1.9.1
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21171
 
Oval ID: oval:org.mitre.oval:def:21171
Title: RHSA-2013:1090: ruby security update (Moderate)
Description: The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: patch
Reference(s): RHSA-2013:1090-00
CESA-2013:1090
CVE-2013-4073
Version: 4
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
CentOS Linux 5
CentOS Linux 6
Product(s): ruby
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22831
 
Oval ID: oval:org.mitre.oval:def:22831
Title: DEPRECATED: ELSA-2013:1090: ruby security update (Moderate)
Description: The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: patch
Reference(s): ELSA-2013:1090-00
CVE-2013-4073
Version: 7
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): ruby
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23987
 
Oval ID: oval:org.mitre.oval:def:23987
Title: ELSA-2013:1090: ruby security update (Moderate)
Description: The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Family: unix Class: patch
Reference(s): ELSA-2013:1090-00
CVE-2013-4073
Version: 6
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): ruby
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25425
 
Oval ID: oval:org.mitre.oval:def:25425
Title: SUSE-SU-2014:0337-1 -- Security update for python
Description: This update for Python fixes the following security issues: * bnc#834601: SSL module does not handle certificates that contain hostnames with NULL bytes. (CVE-2013-4238) * bnc#856836: Various stdlib read flaws. (CVE-2013-1752) Additionally, the following non-security issues have been fixed: * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict with Python's GC. * bnc#847135: Setting fips=1 at boot time causes problems with Python due to MD5 usage.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0337-1
CVE-2013-4238
CVE-2013-1752
CVE-2013-4073
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): python
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25752
 
Oval ID: oval:org.mitre.oval:def:25752
Title: SUSE-SU-2013:1260-3 -- Security update for ruby
Description: Ruby failed to check hostnames correctly when setting up a SSL client connection. CVE-2013-4073 was assigned to this issue. Security Issue reference: * CVE-2013-4073 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073 >
Family: unix Class: patch
Reference(s): SUSE-SU-2013:1260-3
CVE-2013-4073
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): ruby
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25855
 
Oval ID: oval:org.mitre.oval:def:25855
Title: SUSE-SU-2013:1260-2 -- Security update for ruby
Description: Ruby failed to check hostnames correctly when setting up a SSL client connection. CVE-2013-4073 was assigned to this issue. Security Issues: * CVE-2013-4073 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073 >
Family: unix Class: patch
Reference(s): SUSE-SU-2013:1260-2
CVE-2013-4073
Version: 3
Platform(s): SUSE Linux Enterprise Desktop 10
Product(s): ruby
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26038
 
Oval ID: oval:org.mitre.oval:def:26038
Title: SUSE-SU-2014:0843-1 -- Security update for ruby
Description: Ruby received an LTSS roll-up update to fix the following security issues.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0843-1
CVE-2013-1821
CVE-2013-4164
CVE-2013-4073
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
Product(s): ruby
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26239
 
Oval ID: oval:org.mitre.oval:def:26239
Title: SUSE-SU-2014:0844-1 -- Security update for ruby
Description: Ruby received an LTSS roll-up update to fix the following security issues.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0844-1
CVE-2012-4481
CVE-2013-1821
CVE-2013-4164
CVE-2013-4073
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
Product(s): ruby
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27324
 
Oval ID: oval:org.mitre.oval:def:27324
Title: DEPRECATED: ELSA-2013-1090 -- ruby security update (moderate)
Description: [1.8.7.352-12] - Fix regression introduced by CVE-2013-4073 https://bugs.ruby-lang.org/issues/8575 * ruby-2.0.0-p255-Fix-SSL-client-connection-crash-for-SAN-marked-critical.patch - Related: rhbz#979300 [1.8.7.352-11] - hostname check bypassing vulnerability in SSL client. * ruby-1.8.7-p374-CVE-2013-4073-fix-hostname-verification.patch - Resolves: rhbz#979300
Family: unix Class: patch
Reference(s): ELSA-2013-1090
CVE-2013-4073
Version: 4
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): ruby
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 42

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-02-27 IAVM : 2014-A-0030 - Apple Mac OS X Security Update 2014-001
Severity : Category I - VMSKEY : V0044547

Nessus® Vulnerability Scanner

Date Description
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_ruby_20130924.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-575.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-572.nasl - Type : ACT_GATHER_INFO
2014-03-07 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_python-201402-140224.nasl - Type : ACT_GATHER_INFO
2014-02-25 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_SecUpd2014-001.nasl - Type : ACT_GATHER_INFO
2014-02-25 Name : The remote host is missing a Mac OS X update that fixes a certificate validat...
File : macosx_10_9_2.nasl - Type : ACT_GATHER_INFO
2013-12-14 Name : The remote web server uses a version of PHP that is potentially affected by m...
File : php_5_3_28.nasl - Type : ACT_GATHER_INFO
2013-12-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2809.nasl - Type : ACT_GATHER_INFO
2013-10-28 Name : A web application on the remote host has multiple vulnerabilities.
File : puppet_enterprise_301.nasl - Type : ACT_GATHER_INFO
2013-10-23 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_10_9.nasl - Type : ACT_GATHER_INFO
2013-08-20 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2738.nasl - Type : ACT_GATHER_INFO
2013-07-31 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_ruby-130708.nasl - Type : ACT_GATHER_INFO
2013-07-30 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_ruby-8639.nasl - Type : ACT_GATHER_INFO
2013-07-28 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-201.nasl - Type : ACT_GATHER_INFO
2013-07-19 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1090.nasl - Type : ACT_GATHER_INFO
2013-07-18 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1090.nasl - Type : ACT_GATHER_INFO
2013-07-18 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130717_ruby_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-07-18 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1090.nasl - Type : ACT_GATHER_INFO
2013-07-16 Name : The remote Fedora host is missing a security update.
File : fedora_2013-12663.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_ebd877b97ef44375b1fdc67780581898.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Fedora host is missing a security update.
File : fedora_2013-12123.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Fedora host is missing a security update.
File : fedora_2013-12062.nasl - Type : ACT_GATHER_INFO
2013-07-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1902-1.nasl - Type : ACT_GATHER_INFO
2013-06-28 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2013-178-01.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2013-08-20 17:26:42
  • Multiple Updates
2013-07-23 21:18:52
  • First insertion