Errata ALT-PU-2018-1698-1: Information
Fixes
Published: Dec. 14, 2017
BDU:2019-00512
Уязвимость реализации команд Net::FTP интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды
Severity: HIGH (8.8) Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Links:
Published: April 28, 2018
BDU:2019-04036
Уязвимость методов Dir.open, Dir.new, Dir.entries и Dir.empty интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным или оказать воздействие на целостность защищаемой информации
Severity: MEDIUM (6.5) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Links:
Published: March 28, 2018
BDU:2019-04156
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю внедрить произвольные HTTP-заголовки
Severity: MEDIUM (5.3) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Links:
Published: March 28, 2018
BDU:2019-04470
Уязвимость метода Dir.mktmpdir библиотеки tmpdir интерпретатора языка программирования Ruby, позволяющая нарушителю записать произвольные файлы в файловую систему
Severity: HIGH (7.5) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Links:
Published: March 28, 2018
BDU:2019-04471
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
Severity: HIGH (7.5) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Links:
Published: March 28, 2018
BDU:2019-04472
Уязвимость метода String#unpack интерпретатора языка программирования Ruby, позволяющая нарушителю раскрыть защищаемую информацию
Severity: HIGH (7.5) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Links:
Published: March 28, 2018
BDU:2019-04473
Уязвимость методов UNIXServer.open и UNIXSocket.open интерпретатора языка программирования Ruby, позволяющая нарушителю обойти ограничения безопасности
Severity: HIGH (7.5) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Links:
Published: Dec. 20, 2017
BDU:2019-04563
Уязвимость функции lazy_initialize интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольный код
Severity: CRITICAL (9.8) Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Links:
Published: Dec. 15, 2017
Modified: Sept. 19, 2019
Modified: Sept. 19, 2019
CVE-2017-17405
Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
Severity: HIGH (8.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Links:
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
- https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
- 102204
- 43381
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- RHSA-2018:0378
- RHSA-2018:0585
- RHSA-2018:0584
- RHSA-2018:0583
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- 1042004
- RHSA-2019:2806
Published: April 4, 2018
Modified: May 1, 2023
Modified: May 1, 2023
CVE-2017-17742
Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
Severity: MEDIUM (5.3) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Links:
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
- 103684
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- USN-3685-1
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- 1042004
- RHSA-2018:3731
- RHSA-2018:3730
- RHSA-2018:3729
- openSUSE-SU-2019:1771
- RHSA-2019:2028
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
Published: Dec. 20, 2017
Modified: Aug. 3, 2018
Modified: Aug. 3, 2018
CVE-2017-17790
The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.
Severity: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Links:
- https://github.com/ruby/ruby/pull/1777
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
- [debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
- RHSA-2018:0378
- RHSA-2018:0585
- RHSA-2018:0584
- RHSA-2018:0583
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
Published: April 4, 2018
Modified: July 21, 2019
Modified: July 21, 2019
CVE-2018-6914
Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Links:
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- 103686
- USN-3626-1
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- 1042004
- RHSA-2018:3731
- RHSA-2018:3730
- RHSA-2018:3729
- openSUSE-SU-2019:1771
- RHSA-2019:2028
Published: April 4, 2018
Modified: July 21, 2019
Modified: July 21, 2019
CVE-2018-8777
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Links:
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- 103683
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- USN-3685-1
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- 1042004
- RHSA-2018:3731
- RHSA-2018:3730
- RHSA-2018:3729
- openSUSE-SU-2019:1771
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0663
Published: April 4, 2018
Modified: Oct. 3, 2019
Modified: Oct. 3, 2019
CVE-2018-8778
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Links:
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- 103693
- USN-3626-1
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- 1042004
- RHSA-2018:3731
- RHSA-2018:3730
- RHSA-2018:3729
- openSUSE-SU-2019:1771
- RHSA-2019:2028
Published: April 4, 2018
Modified: July 21, 2019
Modified: July 21, 2019
CVE-2018-8779
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Links:
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
- USN-3626-1
- 103767
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- 1042004
- RHSA-2018:3731
- RHSA-2018:3730
- RHSA-2018:3729
- openSUSE-SU-2019:1771
- RHSA-2019:2028
Published: April 4, 2018
Modified: July 21, 2019
Modified: July 21, 2019
CVE-2018-8780
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
Severity: CRITICAL (9.1) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Links:
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
- 103739
- USN-3626-1
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- DSA-4259
- 1042004
- RHSA-2018:3731
- RHSA-2018:3730
- RHSA-2018:3729
- openSUSE-SU-2019:1771
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0663