Inadequate Encryption Strength in Ruby Ruby



Published: 2019-11-26 | Updated: 2020-07-17
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2011-4121
CWE-ID CWE-326
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Ruby
Universal components / Libraries / Scripting languages

Vendor Ruby

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Inadequate Encryption Strength

EUVDB-ID: #VU30579

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-4121

CWE-ID: CWE-326 - Inadequate Encryption Strength

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private RSA key generation. A remote attacker could use this flaw to bypass or corrupt integrity of services, depending on strong private RSA keys generation mechanism.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Ruby: 1.9.0 - 1.9.2-p180

External links

http://www.openwall.com/lists/oss-security/2013/07/01/1
http://access.redhat.com/security/cve/cve-2011-4121
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4121
http://security-tracker.debian.org/tracker/CVE-2011-4121


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###