Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2025.7418.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-7418-1)
Summary:The remote host is missing an update for the 'ruby2.7, ruby3.0, ruby3.2, ruby3.3' package(s) announced via the USN-7418-1 advisory.
Description:Summary:
The remote host is missing an update for the 'ruby2.7, ruby3.0, ruby3.2, ruby3.3' package(s) announced via the USN-7418-1 advisory.

Vulnerability Insight:
It was discovered that Ruby incorrectly handled parsing of an XML document
that has specific XML characters in an attribute value using REXML gem. An
attacker could use this issue to cause Ruby to crash, resulting in a
denial of service. This issue only affected in Ubuntu 22.04 LTS, Ubuntu
24.04 LTS, and Ubuntu 24.10. (CVE-2024-35176, CVE-2024-39908,
CVE-2024-41123, CVE-2024-43398)

It was discovered that Ruby incorrectly handled expanding ranges in the
net-imap response parser. If a user or automated system were tricked into
connecting to a malicious IMAP server, a remote attacker could possibly use
this issue to consume memory, leading to a denial of service. This issue
only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-25186)

It was discovered that the Ruby CGI gem incorrectly handled parsing certain
cookies. A remote attacker could possibly use this issue to consume
resources, leading to a denial of service. (CVE-2025-27219)

It was discovered that the Ruby CGI gem incorrectly handled parsing certain
regular expressions. A remote attacker could possibly use this issue to
consume resources, leading to a denial of service. (CVE-2025-27220)

It was discovered that the Ruby URI gem incorrectly handled certain URI
handling methods. A remote attacker could possibly use this issue to leak
authentication credentials. (CVE-2025-27221)

Affected Software/OS:
'ruby2.7, ruby3.0, ruby3.2, ruby3.3' package(s) on Ubuntu 20.04, Ubuntu 22.04, Ubuntu 24.04, Ubuntu 24.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-35176
https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb
https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176
Common Vulnerability Exposure (CVE) ID: CVE-2024-39908
Common Vulnerability Exposure (CVE) ID: CVE-2024-41123
Common Vulnerability Exposure (CVE) ID: CVE-2024-43398
Common Vulnerability Exposure (CVE) ID: CVE-2025-25186
Common Vulnerability Exposure (CVE) ID: CVE-2025-27219
Common Vulnerability Exposure (CVE) ID: CVE-2025-27220
Common Vulnerability Exposure (CVE) ID: CVE-2025-27221
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.