English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 76783 CVE descriptions
and 40246 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64162
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-691-1 (ruby1.9)
Summary:Ubuntu USN-691-1 (ruby1.9)
Description:
The remote host is missing an update to ruby1.9
announced via advisory USN-691-1.

Details follow:

Laurent Gaffie discovered that Ruby did not properly check for memory
allocation failures. If a user or automated system were tricked into
running a malicious script, an attacker could cause a denial of
service. (CVE-2008-3443)

This update also fixes a regression in the upstream patch previously
applied to fix CVE-2008-3790. The regression would cause parsing of
some XML documents to fail.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
ruby1.9 1.9.0.2-7ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-691-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-3443
http://www.milw0rm.com/exploits/6239
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Debian Security Information: DSA-1695 (Google Search)
http://www.debian.org/security/2009/dsa-1695
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
http://www.redhat.com/support/errata/RHSA-2008-0895.html
http://www.redhat.com/support/errata/RHSA-2008-0897.html
http://www.ubuntulinux.org/support/documentation/usn/usn-691-1
http://www.ubuntulinux.org/support/documentation/usn/usn-651-1
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
BugTraq ID: 30682
http://www.securityfocus.com/bid/30682
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9570
http://www.securitytracker.com/id?1021075
http://secunia.com/advisories/33185
http://secunia.com/advisories/31430
http://secunia.com/advisories/33398
http://secunia.com/advisories/32165
http://secunia.com/advisories/32219
http://secunia.com/advisories/32371
http://secunia.com/advisories/32372
http://secunia.com/advisories/35074
http://securityreason.com/securityalert/4158
http://www.vupen.com/english/advisories/2009/1297
XForce ISS Database: ruby-regex-dos(44688)
http://xforce.iss.net/xforce/xfdb/44688
Common Vulnerability Exposure (CVE) ID: CVE-2008-3790
http://www.openwall.com/lists/oss-security/2008/08/25/4
http://www.openwall.com/lists/oss-security/2008/08/26/1
http://www.openwall.com/lists/oss-security/2008/08/26/4
http://groups.google.com/group/comp.lang.ruby/browse_thread/thread/19f69e8a081fc0d1/e138e014b74352ca
Debian Security Information: DSA-1651 (Google Search)
http://www.debian.org/security/2008/dsa-1651
Debian Security Information: DSA-1652 (Google Search)
http://www.debian.org/security/2008/dsa-1652
http://security.gentoo.org/glsa/glsa-200812-17.xml
BugTraq ID: 30802
http://www.securityfocus.com/bid/30802
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10393
http://www.vupen.com/english/advisories/2008/2483
http://www.vupen.com/english/advisories/2008/2428
http://www.securitytracker.com/id?1020735
http://secunia.com/advisories/31602
http://secunia.com/advisories/32255
http://secunia.com/advisories/32256
http://secunia.com/advisories/33178
XForce ISS Database: ruby-rexml-dos(44628)
http://xforce.iss.net/xforce/xfdb/44628
Common Vulnerability Exposure (CVE) ID: CVE-2008-1094
Bugtraq: 20081216 CVE-2008-1094 - Barracuda Span Firewall SQL Injection Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499293/100/0/threaded
http://www.milw0rm.com/exploits/7496
http://dcsl.ul.ie/advisories/02.htm
http://securitytracker.com/id?1021455
http://secunia.com/advisories/33164
http://securityreason.com/securityalert/4793
Common Vulnerability Exposure (CVE) ID: CVE-2008-0971
Bugtraq: 20081216 CVE-2008-0971 - Barracuda Networks products Multiple Cross-Site Scripting Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499294/100/0/threaded
http://dcsl.ul.ie/advisories/03.htm
http://www.osvdb.org/50709
http://securitytracker.com/id?1021454
http://securityreason.com/securityalert/4792
Common Vulnerability Exposure (CVE) ID: CVE-2008-4122
Bugtraq: 20081216 Joomla: Session hijacking vulnerability, CVE-2008-4122 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499295/100/0/threaded
Bugtraq: 20081218 Re: Joomla: Session hijacking vulnerability, CVE-2008-4122 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499354/100/0/threaded
http://int21.de/cve/CVE-2008-4122-joomla.html
http://securityreason.com/securityalert/4794
Common Vulnerability Exposure (CVE) ID: CVE-2007-2126
http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_April_2007_Analysis.pdf
http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html
HPdes Security Advisory: HPSBMA02133
http://www.securityfocus.com/archive/1/archive/1/466329/100/200/threaded
HPdes Security Advisory: SSRT061201
Cert/CC Advisory: TA07-108A
http://www.us-cert.gov/cas/techalerts/TA07-108A.html
BugTraq ID: 23532
http://www.securityfocus.com/bid/23532
http://www.vupen.com/english/advisories/2007/1426
http://www.securitytracker.com/id?1017927
Common Vulnerability Exposure (CVE) ID: CVE-2008-5500
https://bugzilla.mozilla.org/show_bug.cgi?id=460803
https://bugzilla.mozilla.org/show_bug.cgi?id=464998
Debian Security Information: DSA-1697 (Google Search)
http://www.debian.org/security/2009/dsa-1697
Debian Security Information: DSA-1704 (Google Search)
http://www.debian.org/security/2009/dsa-1704
Debian Security Information: DSA-1707 (Google Search)
http://www.debian.org/security/2009/dsa-1707
Debian Security Information: DSA-1696 (Google Search)
http://www.debian.org/security/2009/dsa-1696
http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
http://www.redhat.com/support/errata/RHSA-2008-1036.html
http://www.redhat.com/support/errata/RHSA-2008-1037.html
http://www.redhat.com/support/errata/RHSA-2009-0002.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
http://www.ubuntulinux.org/support/documentation/usn/usn-690-1
http://www.ubuntu.com/usn/usn-690-2
http://www.ubuntulinux.org/support/documentation/usn/usn-690-3
http://www.ubuntu.com/usn/usn-701-1
http://www.ubuntu.com/usn/usn-701-2
BugTraq ID: 32882
http://www.securityfocus.com/bid/32882
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11053
http://www.securitytracker.com/id?1021417
http://secunia.com/advisories/33231
http://secunia.com/advisories/33433
http://secunia.com/advisories/33216
http://secunia.com/advisories/33232
http://secunia.com/advisories/33523
http://secunia.com/advisories/33547
http://secunia.com/advisories/33184
http://secunia.com/advisories/33188
http://secunia.com/advisories/33189
http://secunia.com/advisories/33203
http://secunia.com/advisories/33204
http://secunia.com/advisories/33205
http://secunia.com/advisories/33421
http://secunia.com/advisories/33434
http://secunia.com/advisories/34501
http://secunia.com/advisories/35080
http://secunia.com/advisories/33408
http://secunia.com/advisories/33415
http://www.vupen.com/english/advisories/2009/0977
XForce ISS Database: mozilla-layout-code-execution-var3(47406)
http://xforce.iss.net/xforce/xfdb/47406
Common Vulnerability Exposure (CVE) ID: CVE-2008-5503
https://bugzilla.mozilla.org/show_bug.cgi?id=379959
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11423
http://www.securitytracker.com/id?1021424
XForce ISS Database: mozilla-xbl-information-disclosure(47409)
http://xforce.iss.net/xforce/xfdb/47409
Common Vulnerability Exposure (CVE) ID: CVE-2008-5504
https://bugzilla.mozilla.org/show_bug.cgi?id=453526
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10781
http://www.securitytracker.com/id?1021422
XForce ISS Database: firefox-feedpreview-code-execution(47410)
http://xforce.iss.net/xforce/xfdb/47410
Common Vulnerability Exposure (CVE) ID: CVE-2008-5506
https://bugzilla.mozilla.org/show_bug.cgi?id=458248
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10512
http://www.securitytracker.com/id?1021427
XForce ISS Database: mozilla-xmlhttprequest-302-info-disclosure(47412)
http://xforce.iss.net/xforce/xfdb/47412
Common Vulnerability Exposure (CVE) ID: CVE-2008-5507
Bugtraq: 20081218 Firefox cross-domain text theft (CESA-2008-011) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499353/100/0/threaded
https://bugzilla.mozilla.org/show_bug.cgi?id=461735
http://scary.beasts.org/security/CESA-2008-011.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9376
http://www.securitytracker.com/id?1021423
XForce ISS Database: mozilla-javascripturl-infor-disclosure(47413)
http://xforce.iss.net/xforce/xfdb/47413
Common Vulnerability Exposure (CVE) ID: CVE-2008-5508
https://bugzilla.mozilla.org/show_bug.cgi?id=425046
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11040
http://www.securitytracker.com/id?1021426
XForce ISS Database: mozilla-urlparsing-weak-security(47414)
http://xforce.iss.net/xforce/xfdb/47414
Common Vulnerability Exposure (CVE) ID: CVE-2008-5510
https://bugzilla.mozilla.org/show_bug.cgi?id=228856
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9662
http://www.securitytracker.com/id?1021425
XForce ISS Database: mozilla-cssparser-security-bypass(47415)
http://xforce.iss.net/xforce/xfdb/47415
Common Vulnerability Exposure (CVE) ID: CVE-2008-5511
https://bugzilla.mozilla.org/show_bug.cgi?id=451680
https://bugzilla.mozilla.org/show_bug.cgi?id=464174
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11881
http://www.securitytracker.com/id?1021418
XForce ISS Database: mozilla-xbl-security-bypass(47417)
http://xforce.iss.net/xforce/xfdb/47417
Common Vulnerability Exposure (CVE) ID: CVE-2008-5512
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9814
XForce ISS Database: mozilla-xpcnativewrappers-code-execution(47416)
http://xforce.iss.net/xforce/xfdb/47416
Common Vulnerability Exposure (CVE) ID: CVE-2008-5513
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10389
http://www.securitytracker.com/id?1021421
XForce ISS Database: firefox-sessionrestore-security-bypass(47418)
http://xforce.iss.net/xforce/xfdb/47418
Common Vulnerability Exposure (CVE) ID: CVE-2008-5501
https://bugzilla.mozilla.org/show_bug.cgi?id=395623
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10257
XForce ISS Database: mozilla-layout-code-execution-var4(47407)
http://xforce.iss.net/xforce/xfdb/47407
Common Vulnerability Exposure (CVE) ID: CVE-2008-5502
https://bugzilla.mozilla.org/show_bug.cgi?id=458679
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10001
XForce ISS Database: firefox-js-deflatestring-code-execution(47408)
http://xforce.iss.net/xforce/xfdb/47408
Common Vulnerability Exposure (CVE) ID: CVE-2008-5505
https://bugzilla.mozilla.org/show_bug.cgi?id=295994
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10443
http://www.securitytracker.com/id?1021428
XForce ISS Database: firefox-xul-weak-security(47411)
http://xforce.iss.net/xforce/xfdb/47411
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.