|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2005:799|
|Summary:||Redhat Security Advisory RHSA-2005:799|
The remote host is missing updates announced in
Ruby is an interpreted scripting language for object-oriented programming.
A bug was found in the way ruby handles eval statements. It is possible for
a malicious script to call eval in such a way that can allow the bypass of
certain safe-level restrictions. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-2337 to this issue.
Users of Ruby should update to these erratum packages, which contain a
backported patch and are not vulnerable to this issue.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
BugTraq ID: 17951|
BugTraq ID: 14909
Common Vulnerability Exposure (CVE) ID: CVE-2005-2337
Debian Security Information: DSA-860 (Google Search)
Debian Security Information: DSA-862 (Google Search)
Debian Security Information: DSA-864 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:005 (Google Search)
Cert/CC Advisory: TA06-132A
CERT/CC vulnerability note: VU#160012
XForce ISS Database: ruby-eval-security-bypass(22360)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.