Amazon Linux AMI update for ruby19



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2013-4164
CWE-ID CWE-122
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Heap-based buffer overflow

EUVDB-ID: #VU32601

Risk: Medium

CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:A/U:Green]

CVE-ID: CVE-2013-4164

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780. A remote attacker can use a string that is converted to a floating point value to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages:

i686:
    rubygem19-json-1.5.5-31.55.amzn1.i686
    rubygem19-io-console-0.3-31.55.amzn1.i686
    ruby19-libs-1.9.3.484-31.55.amzn1.i686
    rubygem19-bigdecimal-1.1.0-31.55.amzn1.i686
    ruby19-1.9.3.484-31.55.amzn1.i686
    ruby19-debuginfo-1.9.3.484-31.55.amzn1.i686
    ruby19-doc-1.9.3.484-31.55.amzn1.i686
    ruby19-devel-1.9.3.484-31.55.amzn1.i686

noarch:
    ruby19-irb-1.9.3.484-31.55.amzn1.noarch
    rubygem19-minitest-2.5.1-31.55.amzn1.noarch
    rubygem19-rdoc-3.9.5-31.55.amzn1.noarch
    rubygems19-1.8.23-31.55.amzn1.noarch
    rubygems19-devel-1.8.23-31.55.amzn1.noarch
    rubygem19-rake-0.9.2.2-31.55.amzn1.noarch

src:
    ruby19-1.9.3.484-31.55.amzn1.src

x86_64:
    ruby19-doc-1.9.3.484-31.55.amzn1.x86_64
    rubygem19-bigdecimal-1.1.0-31.55.amzn1.x86_64
    ruby19-devel-1.9.3.484-31.55.amzn1.x86_64
    ruby19-debuginfo-1.9.3.484-31.55.amzn1.x86_64
    ruby19-1.9.3.484-31.55.amzn1.x86_64
    ruby19-libs-1.9.3.484-31.55.amzn1.x86_64
    rubygem19-io-console-0.3-31.55.amzn1.x86_64
    rubygem19-json-1.5.5-31.55.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

https://alas.aws.amazon.com/ALAS-2013-247.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###