Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57304
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1157)
Summary:The remote host is missing an update for the Debian 'ruby1.8' package(s) announced via the DSA-1157 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'ruby1.8' package(s) announced via the DSA-1157 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to the bypass of security restrictions or denial of service. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-1931

It was discovered that the use of blocking sockets can lead to denial of service.

CVE-2006-3964

It was discovered that Ruby does not properly maintain 'safe levels' for aliasing, directory accesses and regular expressions, which might lead to a bypass of security restrictions.

For the stable distribution (sarge) these problems have been fixed in version 1.8.2-7sarge4.

For the unstable distribution (sid) these problems have been fixed in version 1.8.4-3.

We recommend that you upgrade your Ruby packages.

Affected Software/OS:
'ruby1.8' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-1931
1015978
http://securitytracker.com/id?1015978
16904
http://secunia.com/advisories/16904
17645
http://www.securityfocus.com/bid/17645
19772
http://secunia.com/advisories/19772
19804
http://secunia.com/advisories/19804
20024
http://secunia.com/advisories/20024
20064
http://secunia.com/advisories/20064
20457
http://secunia.com/advisories/20457
21657
http://secunia.com/advisories/21657
24972
http://www.osvdb.org/24972
DSA-1157
http://www.debian.org/security/2006/dsa-1157
GLSA-200605-11
http://www.gentoo.org/security/en/glsa/glsa-200605-11.xml
MDKSA-2006:079
http://www.mandriva.com/security/advisories?name=MDKSA-2006:079
RHSA-2006:0427
http://www.redhat.com/support/errata/RHSA-2006-0427.html
SUSE-SR:2006:012
http://www.novell.com/linux/security/advisories/2006-06-02.html
USN-273-1
https://usn.ubuntu.com/273-1/
ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-webrick-dos-1.patch
ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-xmlrpc-dos-1.patch
http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-dev/27787
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189540
oval:org.mitre.oval:def:11100
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11100
ruby-socket-dos(26102)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26102
Common Vulnerability Exposure (CVE) ID: CVE-2006-3694
BugTraq ID: 18944
http://www.securityfocus.com/bid/18944
Debian Security Information: DSA-1139 (Google Search)
http://www.debian.org/security/2006/dsa-1139
Debian Security Information: DSA-1157 (Google Search)
http://jvn.jp/jp/JVN%2313947696/index.html
http://jvn.jp/jp/JVN%2383768862/index.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:134
http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003907.html
http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003915.html
http://www.osvdb.org/27144
http://www.osvdb.org/27145
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9983
http://www.redhat.com/support/errata/RHSA-2006-0604.html
http://secunia.com/advisories/21009
http://secunia.com/advisories/21233
http://secunia.com/advisories/21236
http://secunia.com/advisories/21272
http://secunia.com/advisories/21337
http://secunia.com/advisories/21598
http://secunia.com/advisories/21749
SGI Security Advisory: 20060801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
SuSE Security Announcement: SUSE-SR:2006:021 (Google Search)
http://www.novell.com/linux/security/advisories/2006_21_sr.html
http://www.ubuntu.com/usn/usn-325-1
http://www.vupen.com/english/advisories/2006/2760
XForce ISS Database: ruby-alias-directory-security-bypass(27725)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27725
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.