SB2017090606 - Debian update for ruby
Published: September 6, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Command injection (CVE-ID: CVE-2015-9096)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.The weakness exists due to improper validation of user supplied input in the Net::SMTP function. A remote attacker can use CRLF sequences in a RCPT TO or MAIL FROM command and execute arbitrary SMTP commands on the system.
2) Security restrictions bypass (CVE-ID: CVE-2016-7798)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to the openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key. A remote attacker can bypass the encryption protection mechanism and gain access to the system.
3) Security restrictions bypass (CVE-ID: CVE-2017-0899)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to unknown error. A remote attacker can escape ANSI.
4) Denial of service (CVE-ID: CVE-2017-0900)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to insufficient validation of user-supplied input. A local attacker can supply a specially crafted 'query' command and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
5) Improper input validation (CVE-ID: CVE-2017-0901)
The vulnerability allows a remote attacker to overwrite arbitrary files on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim into installing a specially crafted RubyGem and overwrite arbitrary files.
6) Session hijacking (CVE-ID: CVE-2017-0902)
The vulnerability allows a remote attacker to hijack the target user's session.The weakness exists due to improper access control. A remote attacker can hijack DNS sessions.
7) Information disclosure (CVE-ID: CVE-2017-14064)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to an issue with using strdup in ext/json/ext/generator/generator.c during a JSON generate call. A remote attacker can send a specially crafted request, stop strdup after encountering a '' byte, returning a pointer to a string of length zero, which is not the length stored in space_len and expose arbitrary memory.
Successful exploitation of the vulnerability results in information disclosure.
Remediation
Install update from vendor's website.