exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

CVE-2005-2337

Status Candidate

Overview

Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).

Related Files

Debian Linux Security Advisory 864-1
Posted Oct 13, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 864-1 - Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed.

tags | advisory, ruby
systems | linux, debian
advisories | CVE-2005-2337
SHA-256 | 47d5ecae7b6493059ad85577eb016af802a60c1caed43f6179eb8ecc02068db4
Debian Linux Security Advisory 862-1
Posted Oct 12, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 862-1 - Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed.

tags | advisory, ruby
systems | linux, debian
advisories | CVE-2005-2337
SHA-256 | 7c7cf1c16c4b6ebeb2b02b742f56e1015994c3dfb16e5aec809e8a8ed7ef0001
Debian Linux Security Advisory 860-1
Posted Oct 12, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 860-1 - Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed.

tags | advisory, ruby
systems | linux, debian
advisories | CVE-2005-2337
SHA-256 | 8beacbf418dcdd8f72f7bf9403c9b8c4000ba52af1dbccc3bfb38855ea30c562
Ubuntu Security Notice 195-1
Posted Oct 11, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-195-1 - The object oriented scripting language Ruby supports safely executing untrusted code with two mechanisms: safe level and taint flag on objects. Dr. Yutaka Oiwa discovered a vulnerability that allows Ruby methods to bypass these mechanisms. In systems which use this feature, this could be exploited to execute Ruby code beyond the restrictions specified in each safe level.

tags | advisory, ruby
systems | linux, ubuntu
advisories | CVE-2005-2337
SHA-256 | 33259b5e626f74233de9e244fa4515852b325afd9ec34cc3d88ec50789be7cd0
Gentoo Linux Security Advisory 200510-5
Posted Oct 7, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200510-05 - Dr. Yutaka Oiwa discovered that Ruby fails to properly enforce safe level protections. Versions less than 1.8.3 are affected.

tags | advisory, ruby
systems | linux, gentoo
advisories | CVE-2005-2337
SHA-256 | 628f07d0be107774b2214cd9c40dd6bc722c4ad4a000c64d370c950cb06ae7b4
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close