SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Ruby Vendors:   Matsumoto, Yukihiro
Ruby Flaws in RubyGems Let Remote Users Hijack the DNS and Overwrite Files and Let Local Users Deny Service
SecurityTracker Alert ID:  1039249
SecurityTracker URL:  http://securitytracker.com/id/1039249
CVE Reference:   CVE-2017-0899, CVE-2017-0900, CVE-2017-0901, CVE-2017-0902   (Links to External Site)
Date:  Aug 30 2017
Impact:   Denial of service via local system, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.2.7 and before, 2.3.4 and before, 2.4.1 and before
Description:   Several vulnerabilities were reported in Ruby in the RubyGems component. A local user can cause denial of service conditions on the target system. A remote user can cause files to be overwritten on the target system. A remote user can hijack DNS session.

A local user can supply a specially crafted 'query' command to cause denial of service conditions on the target system [CVE-2017-0900].

A remote user can create a specially crafted RubyGem that, when installed by the target user, will overwrite arbitrary files on the target system [CVE-2017-0901].

A remote user can hijack DNS sessions [CVE-2017-0902].

An ANSI escape vulnerability exists [CVE-2017-0899]. The impact was not specified.

[Editor's note: The vulnerabilities reside in RubyGems, which is bundled with Ruby.]

Jonathan Claudius and Yusuke Endoh reported these vulnerabilities.

Impact:   A local user can cause denial of service conditions on the target system.

A remote user can cause files to be overwritten on the target system in certain cases.

A remote user can hijack DNS sessions.

Solution:   The vendor has issued a patches.

[Editor's note: The Ruby patches include the fixed RubyGems version 2.6.13.]

The vendor advisories are available at:

https://www.ruby-lang.org/en/news/2017/08/29/multiple-vulnerabilities-in-rubygems/
http://blog.rubygems.org/2017/08/27/2.6.13-released.html

Vendor URL:  www.ruby-lang.org/en/news/2017/08/29/multiple-vulnerabilities-in-rubygems/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC