Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.2.2015.235
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-235-1)
Summary:The remote host is missing an update for the Debian 'ruby1.9.1' package(s) announced via the DLA-235-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'ruby1.9.1' package(s) announced via the DLA-235-1 advisory.

Vulnerability Insight:
CVE-2011-0188

The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an 'integer truncation issue.'

CVE-2011-2705

use upstream SVN r32050 to modify PRNG state to prevent random number sequence repeatation at forked child process which has same pid. Reported by Eric Wong.

CVE-2012-4522

The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.

CVE-2013-0256

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

CVE-2013-2065

(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.

CVE-2015-1855

OpenSSL extension hostname matching implementation violates RFC 6125

Affected Software/OS:
'ruby1.9.1' package(s) on Debian 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-0188
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:097
http://www.mandriva.com/security/advisories?name=MDVSA-2011:098
http://www.redhat.com/support/errata/RHSA-2011-0908.html
http://www.redhat.com/support/errata/RHSA-2011-0909.html
http://www.redhat.com/support/errata/RHSA-2011-0910.html
http://www.securitytracker.com/id?1025236
Common Vulnerability Exposure (CVE) ID: CVE-2011-2705
49015
http://www.securityfocus.com/bid/49015
FEDORA-2011-9359
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.html
FEDORA-2011-9374
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html
RHSA-2011:1581
http://www.redhat.com/support/errata/RHSA-2011-1581.html
[oss-security] 20110711 CVE Request: ruby PRNG fixes
http://www.openwall.com/lists/oss-security/2011/07/11/1
[oss-security] 20110712 Re: CVE Request: ruby PRNG fixes
http://www.openwall.com/lists/oss-security/2011/07/12/14
[oss-security] 20110720 Re: CVE Request: ruby PRNG fixes
http://www.openwall.com/lists/oss-security/2011/07/20/1
http://www.openwall.com/lists/oss-security/2011/07/20/16
http://redmine.ruby-lang.org/issues/4579
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLog
http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/
https://bugzilla.redhat.com/show_bug.cgi?id=722415
Common Vulnerability Exposure (CVE) ID: CVE-2012-4522
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090235.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090515.html
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
http://www.openwall.com/lists/oss-security/2012/10/12/6
http://www.openwall.com/lists/oss-security/2012/10/13/1
http://www.openwall.com/lists/oss-security/2012/10/16/1
RedHat Security Advisories: RHSA-2013:0129
http://rhn.redhat.com/errata/RHSA-2013-0129.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-0256
http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
https://bugzilla.redhat.com/show_bug.cgi?id=907820
RedHat Security Advisories: RHSA-2013:0548
http://rhn.redhat.com/errata/RHSA-2013-0548.html
RedHat Security Advisories: RHSA-2013:0686
http://rhn.redhat.com/errata/RHSA-2013-0686.html
RedHat Security Advisories: RHSA-2013:0701
http://rhn.redhat.com/errata/RHSA-2013-0701.html
RedHat Security Advisories: RHSA-2013:0728
http://rhn.redhat.com/errata/RHSA-2013-0728.html
http://secunia.com/advisories/52774
SuSE Security Announcement: SUSE-SU-2013:0647 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
SuSE Security Announcement: openSUSE-SU-2013:0303 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html
http://www.ubuntu.com/usn/USN-1733-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-2065
FEDORA-2013-8375
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107098.html
FEDORA-2013-8411
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107064.html
FEDORA-2013-8738
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107120.html
USN-2035-1
http://www.ubuntu.com/usn/USN-2035-1
https://puppet.com/security/cve/cve-2013-2065
https://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
openSUSE-SU-2013:1611
http://lists.opensuse.org/opensuse-updates/2013-10/msg00057.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-1855
http://www.debian.org/security/2015/dsa-3245
http://www.debian.org/security/2015/dsa-3246
http://www.debian.org/security/2015/dsa-3247
https://bugs.ruby-lang.org/issues/9644
https://puppetlabs.com/security/cve/cve-2015-1855
https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.