Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.840344
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-651-1)
Summary:The remote host is missing an update for the 'ruby1.8' package(s) announced via the USN-651-1 advisory.
Description:Summary:
The remote host is missing an update for the 'ruby1.8' package(s) announced via the USN-651-1 advisory.

Vulnerability Insight:
Akira Tagoh discovered a vulnerability in Ruby which lead to an integer
overflow. If a user or automated system were tricked into running a
malicious script, an attacker could cause a denial of service or
possibly execute arbitrary code with the privileges of the user
invoking the program. (CVE-2008-2376)

Laurent Gaffie discovered that Ruby did not properly check for memory
allocation failures. If a user or automated system were tricked into
running a malicious script, an attacker could cause a denial of
service. (CVE-2008-3443)

Keita Yamaguchi discovered several safe level vulnerabilities in Ruby.
An attacker could use this to bypass intended access restrictions.
(CVE-2008-3655)

Keita Yamaguchi discovered that WEBrick in Ruby did not properly
validate paths ending with '.'. A remote attacker could send a crafted
HTTP request and cause a denial of service. (CVE-2008-3656)

Keita Yamaguchi discovered that the dl module in Ruby did not check
the taintness of inputs. An attacker could exploit this vulnerability
to bypass safe levels and execute dangerous functions. (CVE-2008-3657)

Luka Treiber and Mitja Kolsek discovered that REXML in Ruby did not
always use expansion limits when processing XML documents. If a user or
automated system were tricked into open a crafted XML file, an attacker
could cause a denial of service via CPU consumption. (CVE-2008-3790)

Jan Lieskovsky discovered several flaws in the name resolver of Ruby. A
remote attacker could exploit this to spoof DNS entries, which could
lead to misdirected traffic. This is a different vulnerability from
CVE-2008-1447. (CVE-2008-3905)

Affected Software/OS:
'ruby1.8' package(s) on Ubuntu 6.06, Ubuntu 7.04, Ubuntu 7.10, Ubuntu 8.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-2376
20080708 rPSA-2008-0218-1 ruby
http://www.securityfocus.com/archive/1/494104/100/0/threaded
30927
http://secunia.com/advisories/30927
31006
http://secunia.com/advisories/31006
31062
http://secunia.com/advisories/31062
31090
http://secunia.com/advisories/31090
31181
http://secunia.com/advisories/31181
31256
http://secunia.com/advisories/31256
32219
http://secunia.com/advisories/32219
33178
http://secunia.com/advisories/33178
ADV-2008-2584
http://www.vupen.com/english/advisories/2008/2584
APPLE-SA-2008-09-15
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
DSA-1612
http://www.debian.org/security/2008/dsa-1612
DSA-1618
http://www.debian.org/security/2008/dsa-1618
FEDORA-2008-6033
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00112.html
FEDORA-2008-6094
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00161.html
GLSA-200812-17
http://security.gentoo.org/glsa/glsa-200812-17.xml
MDVSA-2008:140
http://www.mandriva.com/security/advisories?name=MDVSA-2008:140
MDVSA-2008:141
http://www.mandriva.com/security/advisories?name=MDVSA-2008:141
MDVSA-2008:142
http://www.mandriva.com/security/advisories?name=MDVSA-2008:142
RHSA-2008:0561
http://www.redhat.com/support/errata/RHSA-2008-0561.html
TA08-260A
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
USN-651-1
https://usn.ubuntu.com/651-1/
[oss-security] 20080702 More ruby integer overflows (rb_ary_fill / Array#fill)
http://www.openwall.com/lists/oss-security/2008/07/02/3
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=17756
http://wiki.rpath.com/Advisories:rPSA-2008-0218
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0218
https://issues.rpath.com/browse/RPL-2639
oval:org.mitre.oval:def:9863
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9863
Common Vulnerability Exposure (CVE) ID: CVE-2008-3443
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
BugTraq ID: 30682
http://www.securityfocus.com/bid/30682
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Debian Security Information: DSA-1695 (Google Search)
http://www.debian.org/security/2009/dsa-1695
https://www.exploit-db.com/exploits/6239
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570
http://www.redhat.com/support/errata/RHSA-2008-0895.html
http://www.redhat.com/support/errata/RHSA-2008-0897.html
http://www.securitytracker.com/id?1021075
http://secunia.com/advisories/31430
http://secunia.com/advisories/32165
http://secunia.com/advisories/32371
http://secunia.com/advisories/32372
http://secunia.com/advisories/33185
http://secunia.com/advisories/33398
http://secunia.com/advisories/35074
http://securityreason.com/securityalert/4158
https://usn.ubuntu.com/691-1/
http://www.vupen.com/english/advisories/2009/1297
XForce ISS Database: ruby-regex-dos(44688)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44688
Common Vulnerability Exposure (CVE) ID: CVE-2008-3655
BugTraq ID: 30644
http://www.securityfocus.com/bid/30644
Bugtraq: 20080831 rPSA-2008-0264-1 ruby (Google Search)
http://www.securityfocus.com/archive/1/495884/100/0/threaded
Debian Security Information: DSA-1651 (Google Search)
http://www.debian.org/security/2008/dsa-1651
Debian Security Information: DSA-1652 (Google Search)
http://www.debian.org/security/2008/dsa-1652
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602
http://www.securitytracker.com/id?1020656
http://secunia.com/advisories/31697
http://secunia.com/advisories/32255
http://secunia.com/advisories/32256
http://www.vupen.com/english/advisories/2008/2334
XForce ISS Database: ruby-safelevel-security-bypass(44369)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44369
Common Vulnerability Exposure (CVE) ID: CVE-2008-3656
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9682
http://www.securitytracker.com/id?1020654
XForce ISS Database: ruby-webrick-dos(44371)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44371
Common Vulnerability Exposure (CVE) ID: CVE-2008-3657
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9793
http://www.securitytracker.com/id?1020652
XForce ISS Database: ruby-dl-security-bypass(44372)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44372
Common Vulnerability Exposure (CVE) ID: CVE-2008-3790
BugTraq ID: 30802
http://www.securityfocus.com/bid/30802
http://groups.google.com/group/comp.lang.ruby/browse_thread/thread/19f69e8a081fc0d1/e138e014b74352ca
http://www.openwall.com/lists/oss-security/2008/08/25/4
http://www.openwall.com/lists/oss-security/2008/08/26/1
http://www.openwall.com/lists/oss-security/2008/08/26/4
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10393
http://www.securitytracker.com/id?1020735
http://secunia.com/advisories/31602
http://www.vupen.com/english/advisories/2008/2428
http://www.vupen.com/english/advisories/2008/2483
XForce ISS Database: ruby-rexml-dos(44628)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44628
Common Vulnerability Exposure (CVE) ID: CVE-2008-3905
BugTraq ID: 31699
http://www.securityfocus.com/bid/31699
http://www.openwall.com/lists/oss-security/2008/09/03/3
http://www.openwall.com/lists/oss-security/2008/09/04/9
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10034
http://secunia.com/advisories/32948
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.371754
XForce ISS Database: ruby-resolv-dns-spoofing(45935)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45935
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.