ALT-PU-2017-2276-1
Closed vulnerabilities
BDU:2017-02182
Уязвимость интерпретатора Ruby, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-02342
Уязвимость функции аутентификации библиотеки WEBrick, позволяющая нарушителю выполнить произвольные команды
BDU:2018-00026
Уязвимость менеджера пакетов rubygems, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю осуществить перезапись любого файла
Modified: 2024-11-21
CVE-2015-9096
Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
- http://www.mbsd.jp/Whitepaper/smtpi.pdf
- http://www.mbsd.jp/Whitepaper/smtpi.pdf
- https://github.com/ruby/ruby/commit/0827a7e52ba3d957a634b063bf5a391239b9ffee
- https://github.com/ruby/ruby/commit/0827a7e52ba3d957a634b063bf5a391239b9ffee
- https://github.com/rubysec/ruby-advisory-db/issues/215
- https://github.com/rubysec/ruby-advisory-db/issues/215
- https://hackerone.com/reports/137631
- https://hackerone.com/reports/137631
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-0898
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
- 100862
- 100862
- 1039363
- 1039363
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/mruby/mruby/issues/3722
- https://github.com/mruby/mruby/issues/3722
- https://hackerone.com/reports/212241
- https://hackerone.com/reports/212241
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3685-1
- USN-3685-1
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
- https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
Modified: 2024-11-21
CVE-2017-0899
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100576
- 100576
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1
- https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1
- https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491
- https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491
- https://hackerone.com/reports/226335
- https://hackerone.com/reports/226335
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-0900
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100579
- 100579
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251
- https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251
- https://hackerone.com/reports/243003
- https://hackerone.com/reports/243003
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-0901
RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100580
- 100580
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2
- https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2
- https://hackerone.com/reports/243156
- https://hackerone.com/reports/243156
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- USN-3553-1
- USN-3553-1
- USN-3685-1
- USN-3685-1
- DSA-3966
- DSA-3966
- 42611
- 42611
Modified: 2024-11-21
CVE-2017-0902
RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- 100586
- 100586
- 1039249
- 1039249
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32
- https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32
- https://hackerone.com/reports/218088
- https://hackerone.com/reports/218088
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-01
- GLSA-201710-01
- USN-3553-1
- USN-3553-1
- USN-3685-1
- USN-3685-1
- DSA-3966
- DSA-3966
Modified: 2024-11-21
CVE-2017-10784
The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
- 100853
- 100853
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3528-1
- USN-3528-1
- USN-3685-1
- USN-3685-1
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
- https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
Modified: 2024-11-21
CVE-2017-14033
The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.
- 100868
- 100868
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- DSA-4031
- DSA-4031
- https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/
- https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
Modified: 2024-11-21
CVE-2017-14064
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
- 100890
- 100890
- 1039363
- 1039363
- 1042004
- 1042004
- RHSA-2017:3485
- RHSA-2017:3485
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0585
- RHSA-2018:0585
- https://bugs.ruby-lang.org/issues/13853
- https://bugs.ruby-lang.org/issues/13853
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
- https://hackerone.com/reports/209949
- https://hackerone.com/reports/209949
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- GLSA-201710-18
- GLSA-201710-18
- USN-3685-1
- USN-3685-1
- DSA-3966
- DSA-3966
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/