Vulnerability identifier: #VU42404
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Opensuse
Operating systems & Components /
Operating system
Ruby
Universal components / Libraries /
Scripting languages
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Opensuse: 12.2 - 12.3
Ruby: 1.9 - 12.3
External links
https://lists.fedoraproject.org/pipermail/package-announce/2013-May/107064.html
https://lists.fedoraproject.org/pipermail/package-announce/2013-May/107098.html
https://lists.fedoraproject.org/pipermail/package-announce/2013-May/107120.html
https://lists.opensuse.org/opensuse-updates/2013-10/msg00057.html
https://www.ubuntu.com/usn/USN-2035-1
https://puppet.com/security/cve/cve-2013-2065
https://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.