English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704332
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 4332-1 (ruby2.3 - security update)
Summary:Several vulnerabilities have been discovered in the interpreter for the;Ruby language. The Common Vulnerabilities and Exposures project;identifies the following problems:;;CVE-2018-16395 ;Tyler Eckstein reported that the equality check of;OpenSSL::X509::Name could return true for non-equal objects. If a;malicious X.509 certificate is passed to compare with an existing;certificate, there is a possibility to be judged incorrectly that;they are equal.;;CVE-2018-16396 ;Chris Seaton discovered that tainted flags are not propagated in;Array#pack and String#unpack with some directives.
Description:Summary:
Several vulnerabilities have been discovered in the interpreter for the
Ruby language. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2018-16395
Tyler Eckstein reported that the equality check of
OpenSSL::X509::Name could return true for non-equal objects. If a
malicious X.509 certificate is passed to compare with an existing
certificate, there is a possibility to be judged incorrectly that
they are equal.

CVE-2018-16396
Chris Seaton discovered that tainted flags are not propagated in
Array#pack and String#unpack with some directives.

Vulnerability Insight:
Ruby is the interpreted scripting language for quick and easy
object-oriented programming. It has many features to process text
files and to do system management tasks (as in perl). It is simple,
straight-forward, and extensible.

Affected Software/OS:
ruby2.3 on Debian Linux

Solution:
For the stable distribution (stretch), these problems have been fixed in
version 2.3.3-1+deb9u4.

We recommend that you upgrade your ruby2.3 packages.

For the detailed security status of ruby2.3 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/ruby2.3

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-16395
Common Vulnerability Exposure (CVE) ID: CVE-2018-16396
CopyrightCopyright (c) 2018 Greenbone Networks GmbH http://greenbone.net

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.