Ruby cgi.rb MIME Boundary Parsing Error Lets Remote Users Deny Service
|
SecurityTracker Alert ID: 1017194 |
SecurityTracker URL: http://securitytracker.com/id/1017194
|
CVE Reference:
CVE-2006-5467
(Links to External Site)
|
Date: Nov 8 2006
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 1.8.5 and prior
|
Description:
A vulnerability was reported in Ruby. A remote user can cause denial of service conditions.
The Ruby cgi.rb CGI library does not properly process multipart MIME boundaries. A remote user can send an HTTP request with a specially crafted multipart MIME boundary specifier to cause the target service to enter an infinite loop and consume excessive CPU resources.
A boundary specifier that begins with a dash character instead of two dash characters ('--') and also contains an inconsistent ID can trigger this flaw.
Zed A. Shaw reported this vulnerability.
The original advisory is available at:
http://rubyforge.org/pipermail/mongrel-users/2006-October/001946.html
|
Impact:
A remote user can cause the software to enter an infinite loop and consume excessive CPU resources.
|
Solution:
The vendor has issued a patch for version 1.8.5, available at:
http://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-cgi-dos-1.patch
The development version (1.9) is fixed after September 24, 2006.
The Ruby advisory is available at:
http://www.ruby-lang.org/en/news/2006/11/03/CVE-2006-5467/
|
Vendor URL: www.ruby-lang.org/en/news/2006/11/03/CVE-2006-5467/ (Links to External Site)
|
Cause:
Exception handling error, Input validation error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|