Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59058
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-371-1 (ruby1.8)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to ruby1.8
announced via advisory USN-371-1.

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

Details follow:

An error was found in Ruby's CGI library that did not correctly check
for the end of multipart MIME requests. Using a crafted HTTP request, a
remote user could cause a denial of service, where Ruby CGI applications
would end up in a loop, monopolizing a CPU.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
libruby1.8 1.8.1+1.8.2pre4-1ubuntu0.5

Ubuntu 5.10:
libruby1.8 1.8.2-9ubuntu1.3

Ubuntu 6.06 LTS:
libruby1.8 1.8.4-1ubuntu1.2

Ubuntu 6.10:
libruby1.8 1.8.4-5ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-371-1

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-5467
1017194
http://securitytracker.com/id?1017194
20061101-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
20777
http://www.securityfocus.com/bid/20777
22615
http://secunia.com/advisories/22615
22624
http://secunia.com/advisories/22624
22761
http://secunia.com/advisories/22761
22929
http://secunia.com/advisories/22929
22932
http://secunia.com/advisories/22932
23040
http://secunia.com/advisories/23040
23344
http://secunia.com/advisories/23344
25402
http://secunia.com/advisories/25402
ADV-2006-4244
http://www.vupen.com/english/advisories/2006/4244
ADV-2006-4245
http://www.vupen.com/english/advisories/2006/4245
ADV-2007-1939
http://www.vupen.com/english/advisories/2007/1939
APPLE-SA-2007-05-24
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
DSA-1234
http://www.debian.org/security/2006/dsa-1234
DSA-1235
http://www.debian.org/security/2006/dsa-1235
GLSA-200611-12
http://security.gentoo.org/glsa/glsa-200611-12.xml
MDKSA-2006:192
http://www.mandriva.com/security/advisories?name=MDKSA-2006:192
OpenPKG-SA-2006.030
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.030-ruby.html
RHSA-2006:0729
http://www.redhat.com/support/errata/RHSA-2006-0729.html
SUSE-SR:2006:026
http://www.novell.com/linux/security/advisories/2006_26_sr.html
USN-371-1
http://www.ubuntu.com/usn/usn-371-1
[mongrel-users] 20061025 [SEC] Mongrel Temporary Fix For cgi.rb 99% CPU DoS Attack
http://rubyforge.org/pipermail/mongrel-users/2006-October/001946.html
http://docs.info.apple.com/article.html?artnum=305530
oval:org.mitre.oval:def:10185
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10185
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.