[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:097 -- Mandriva ruby

ID: oval:org.secpod.oval:def:301028Date: (C)2012-01-07   (M)2023-12-07
Class: PATCHFamily: unix




Multiple vulnerabilities have been identified and fixed in ruby: Cross-site scripting vulnerability in the WEBrick HTTP server in Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page . The FileUtils.remove_entry_secure method in Ruby allows local users to delete arbitrary files via a symlink attack . The safe-level feature in Ruby allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname . The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an integer truncation issue. Packages for 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2010.1
Mandriva Linux 2009.0
Product:
ruby
Reference:
MDVSA-2011:097
CVE-2011-0188
CVE-2011-1005
CVE-2011-1004
CVE-2010-0541
CVE    4
CVE-2010-0541
CVE-2011-0188
CVE-2011-1005
CVE-2011-1004
...
CPE    2
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2010.1

© SecPod Technologies