[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2012-4481Date: (C)2013-04-23   (M)2018-06-20


The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 4.3
Exploit Score: Exploit Score: 8.6
Impact Score: Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: MEDIUM
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: NONE
Scope: Integrity: PARTIAL
Confidentiality: Availability: NONE
Integrity:  
Availability:  
  
Reference:
MDVSA-2013:124
RHSA-2013:0129
RHSA-2013:0612
http://www.openwall.com/lists/oss-security/2012/10/05/4
https://bugzilla.redhat.com/show_bug.cgi?id=863484
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294

CPE    1
cpe:/a:ruby-lang:ruby:1.8.7
CWE    1
CWE-264
OVAL    10
oval:org.secpod.oval:def:701054
oval:org.secpod.oval:def:701039
oval:org.secpod.oval:def:501017
oval:org.secpod.oval:def:1300205
...

© SecPod Technologies