ruby
Page content
- Vulnerable: 1.8.6-4
- Unaffected: 1.8.6-5kalgan1
Some vulnerabilities have been reported in Ruby, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and conduct spoofing attacks.
- Multiple errors in the implementation of safe level restrictions can be exploited to call “untrace_var()”, perform syslog operations, and modify “$PROGRAM_NAME” at safe level 4, or call insecure methods at safe levels 1 through 3.
- An error exists in the usage of regular expressions in “WEBrick::HTTPUtils.split_header_value()”. This can be exploited to consume large amounts of CPU via a specially crafted HTTP request.
- An error in “DL” can be exploited to bypass security restrictions and call potentially dangerous functions.
- The vulnerability is caused due to resolv.rb not sufficiently randomising the DNS query port number, which can be exploited to poison the DNS cache.
- Bug Tracker URL: http://bugs.frugalware.org/task/3300