[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2013-173 ---- ruby

ID: oval:org.secpod.oval:def:1600291Date: (C)2016-05-19   (M)2023-12-07
Class: PATCHFamily: unix




It was discovered that Ruby"s REXML library did not properly restrict XML entity expansion. An attacker could use this flaw to cause a denial of service by tricking a Ruby application using REXML to read text nodes from specially-crafted XML content, which will result in REXML consuming large amounts of system memory. It was found that the RHSA-2011-0910 update did not correctly fix the CVE-2011-1005 issue, a flaw in the method for translating an exception message into a string in the Exception class. A remote attacker could use this flaw to bypass safe level 4 restrictions, allowing untrusted code to modify arbitrary, trusted strings, which safe level 4 restrictions would otherwise prevent. The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname

Platform:
Amazon Linux AMI
Product:
ruby
Reference:
ALAS-2013-173
CVE-2012-4481
CVE-2011-1005
CVE-2013-1821
CVE    3
CVE-2013-1821
CVE-2012-4481
CVE-2011-1005
CPE    2
cpe:/o:amazon:linux
cpe:/a:ruby:ruby

© SecPod Technologies