ALT-PU-2014-1334-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2012-5371
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
- http://2012.appsec-forum.ch/conferences/#c17
- http://2012.appsec-forum.ch/conferences/#c17
- http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
- http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
- 51253
- 51253
- 1027747
- 1027747
- http://www.ocert.org/advisories/ocert-2012-001.html
- http://www.ocert.org/advisories/ocert-2012-001.html
- 87280
- 87280
- http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/
- http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/
- 56484
- 56484
- USN-1733-1
- USN-1733-1
- https://bugzilla.redhat.com/show_bug.cgi?id=875236
- https://bugzilla.redhat.com/show_bug.cgi?id=875236
- ruby-hash-function-dos(79993)
- ruby-hash-function-dos(79993)
- https://www.131002.net/data/talks/appsec12_slides.pdf
- https://www.131002.net/data/talks/appsec12_slides.pdf
Modified: 2024-11-21
CVE-2012-5380
Untrusted search path vulnerability in the installation functionality in Ruby 1.9.3-p194, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Ruby193\bin directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the Ruby installation
Modified: 2024-11-21
CVE-2013-4073
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
- http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21
- http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21
- APPLE-SA-2013-10-22-3
- APPLE-SA-2013-10-22-3
- openSUSE-SU-2013:1181
- openSUSE-SU-2013:1181
- openSUSE-SU-2013:1186
- openSUSE-SU-2013:1186
- RHSA-2013:1090
- RHSA-2013:1090
- RHSA-2013:1103
- RHSA-2013:1103
- RHSA-2013:1137
- RHSA-2013:1137
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6150
- DSA-2738
- DSA-2738
- DSA-2809
- DSA-2809
- http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
- http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
- USN-1902-1
- USN-1902-1
- https://bugzilla.redhat.com/show_bug.cgi?id=979251
- https://bugzilla.redhat.com/show_bug.cgi?id=979251
- https://puppet.com/security/cve/cve-2013-4073
- https://puppet.com/security/cve/cve-2013-4073