SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Ruby Vendors:   Matsumoto, Yukihiro
Ruby Bugs Let Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1020347
SecurityTracker URL:  http://securitytracker.com/id/1020347
CVE Reference:   CVE-2008-2662, CVE-2008-2663, CVE-2008-2664, CVE-2008-2725, CVE-2008-2726   (Links to External Site)
Date:  Jun 23 2008
Impact:   Denial of service via local system, Denial of service via network, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.8.4, 1.8.5-p230, 1.8.6-p229, 1.8.7-p21, 1.9.0-1; and prior versions
Description:   Several vulnerabilities were reported in Ruby. A user can execute arbitrary code on the target system. A user can cause denial of service conditions.

A user can execute arbitrary code on the target system or cause denial of service conditions on the target system.

A remote user may be able to exploit these vulnerabilities, depending on the specific application code.

Drew Yao of Apple Product Security reported these vulnerabilities.

Impact:   A user can execute arbitrary code on the target system.

A user can cause denial of service conditions.

Solution:   The vendor has issued a fix.

1.8 series: Please upgrade to 1.8.5-p231, or 1.8.6-p230, or 1.8.7-p22.

* <URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-p231.tar.gz> (md5sum: e900cf225d55414bffe878f00a85807c)
* <URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p230.tar.gz> (md5sum: 5e8247e39be2dc3c1a755579c340857f)
* <URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p22.tar.gz> (md5sum: fc3ede83a98f48d8cb6de2145f680ef2)

1.9 series: Please upgrade to 1.9.0-2.

* <URL:ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.0-2.tar.gz> (md5sum: 2a848b81ed1d6393b88eec8aa6173b75)

The vendor's advisory is available at:

http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/

Vendor URL:  www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/ (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 1 2008 (Apple Issues Fix for Mac OS X) Ruby Bugs Let Users Deny Service and Execute Arbitrary Code
Apple has issued a fix for Mac OS X.
Jul 14 2008 (Red Hat Issues Fix) Ruby Bugs Let Users Deny Service and Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 4 and 5.
Jul 14 2008 (Red Hat Issues Fix) Ruby Bugs Let Users Deny Service and Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 2.1 and 3.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC