SB2012112404 - Multiple vulnerabilities in Ruby
Published: November 24, 2012 Updated: December 27, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2013-1821)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-4522)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
Remediation
Install update from vendor's website.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html
- http://rhn.redhat.com/errata/RHSA-2013-0611.html
- http://rhn.redhat.com/errata/RHSA-2013-0612.html
- http://rhn.redhat.com/errata/RHSA-2013-1028.html
- http://rhn.redhat.com/errata/RHSA-2013-1147.html
- http://secunia.com/advisories/52783
- http://secunia.com/advisories/52902
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384
- http://www.debian.org/security/2013/dsa-2738
- http://www.debian.org/security/2013/dsa-2809
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:124
- http://www.openwall.com/lists/oss-security/2013/03/06/5
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
- http://www.securityfocus.com/bid/58141
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862
- http://www.ubuntu.com/usn/USN-1780-1
- https://bugzilla.redhat.com/show_bug.cgi?id=914716
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090235.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090515.html
- http://rhn.redhat.com/errata/RHSA-2013-0129.html
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
- http://www.openwall.com/lists/oss-security/2012/10/12/6
- http://www.openwall.com/lists/oss-security/2012/10/13/1
- http://www.openwall.com/lists/oss-security/2012/10/16/1
- http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/