what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Pardus Linux Security Advisory 2008.21

Pardus Linux Security Advisory 2008.21
Posted Aug 13, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple vulnerabilities have been discovered in Ruby: several vulnerabilities in safe level, DoS vulnerability in WEBrick, Lack of taintness check in dl and DNS spoofing vulnerability in resolv.rb.

tags | advisory, denial of service, spoof, vulnerability, ruby
systems | linux
SHA-256 | a3485348dd6752076c34dc92849c09f1be4a2d7a218d600345b59342a9ee3ca2

Pardus Linux Security Advisory 2008.21

Change Mirror Download
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-21 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-08-12
Severity: 3
Type: Remote
------------------------------------------------------------------------

Summary
=======

Multiple vulnerabilities have been discovered in Ruby: several
vulnerabilities in safe level, DoS vulnerability in WEBrick, Lack of
taintness check in dl and DNS spoofing vulnerability in resolv.rb.


Description
===========

== Several vulnerabilities in safe level ==

Multiple errors in the implementation of safe level restrictions can be
exploited to call "untrace_var()", perform syslog operations, and modify
"$PROGRAM_NAME" at safe level 4, or call insecure methods at safe levels
1 through 3.

(These vulnerabilities were reported by Keita Yamaguchi.)


== DoS vulnerability in WEBrick ==

An error exists in the usage of regular expressions in
"WEBrick::HTTPUtils.split_header_value()". This can be exploited to
consume large amounts of CPU via a specially crafted HTTP request.

(This vulnerability was reported by Christian Neukirchen.)


== Lack of taintness check in dl ==

An error in "DL" can be exploited to bypass security restrictions and
call potentially dangerous functions.

(This vulnerability was reported by sheepman.)


== DNS spoofing vulnerability in resolv.rb ==

The vulnerability is caused due to resolv.rb not sufficiently
randomising the DNS query port number, which can be exploited to poison
the DNS cache.

(This vulnerability was reported by Tanaka Akira.)


Affected packages:

Pardus 2008:
ruby, all before 1.8.7_p72-16-4
ruby-mode, all before 1.8.7_p72-16-4

Pardus 2007:
ruby, all before 1.8.7_p72-16-13
ruby-mode, all before 1.8.7_p72-16-4



Resolution
==========

There are update(s) for ruby, ruby-mode. You can update them via Package
Manager or with a single command from console:

Pardus 2008:
pisi up ruby ruby-mode

Pardus 2007:
pisi up ruby ruby-mode


References
==========

* http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
* http://secunia.com/advisories/31430/

------------------------------------------------------------------------

--
Pınar Yanardağ
http://pinguar.org


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close