ALT-PU-2018-1418-1
Closed vulnerabilities
BDU:2019-00512
Уязвимость реализации команд Net::FTP интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды
BDU:2019-04563
Уязвимость функции lazy_initialize интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-17405
Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
- 102204
- 102204
- 1042004
- 1042004
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0584
- RHSA-2018:0584
- RHSA-2018:0585
- RHSA-2018:0585
- RHSA-2019:2806
- RHSA-2019:2806
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- DSA-4259
- 43381
- 43381
- https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
- https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
Modified: 2024-11-21
CVE-2017-17790
The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.
- RHSA-2018:0378
- RHSA-2018:0378
- RHSA-2018:0583
- RHSA-2018:0583
- RHSA-2018:0584
- RHSA-2018:0584
- RHSA-2018:0585
- RHSA-2018:0585
- https://github.com/ruby/ruby/pull/1777
- https://github.com/ruby/ruby/pull/1777
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- DSA-4259