[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2RUBY3.0-2023-003 --- ruby

ID: oval:org.secpod.oval:def:1701670Date: (C)2023-10-26   (M)2024-01-29
Class: PATCHFamily: unix




CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby. A flaw was found in ruby, where the date object was found to be vulnerable to a regular expression denial of service during the parsing of dates. This flaw allows an attacker to hang a ruby application by providing a specially crafted date string. The highest threat to this vulnerability is system availability. CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby

Platform:
Amazon Linux 2
Product:
ruby
rubygem-bigdecimal
rubygem-bundler
rubygem-rexml
rubygem-io-console
rubygem-irb
rubygem-json
rubygem-minitest
rubygem-rss
rubygem-rbs
rubygem-power_assert
rubygem-psych
rubygem-rdoc
rubygem-test-unit
rubygem-typeprof
rubygems
rubygem-rake
Reference:
ALAS2RUBY3.0-2023-003
CVE-2021-41816
CVE-2021-41817
CVE-2021-41819
CVE    3
CVE-2021-41816
CVE-2021-41819
CVE-2021-41817
CPE    6
cpe:/a:rubygem:rubygem-json
cpe:/a:rubygems:rubygem-rake
cpe:/a:gembundler:rubygem-bundler
cpe:/a:ruby:ruby
...

© SecPod Technologies