ALAS2RUBY2.6-2023-004 --- rubyID: oval:org.secpod.oval:def:1701662 | Date: (C)2023-10-26 (M)2024-05-09 |
Class: PATCH | Family: unix |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed . An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Product: |
ruby |
rubygem-bigdecimal |
rubygem-bundler |
rubygem-did_you_mean |
rubygem-io-console |
rubygem-irb |
rubygem-json |
rubygem-minitest |
rubygem-net-telnet |
rubygem-openssl |
rubygem-power_assert |
rubygem-psych |
rubygem-rdoc |
rubygem-test-unit |
rubygem-xmlrpc |
rubygems |
rubygem-rake |