Vulnerabilities > CVE-2005-2337 - Unspecified vulnerability in Yukihiro Matsumoto Ruby

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
yukihiro-matsumoto
nessus

Summary

Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).

Nessus

  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-195-1.NASL
    descriptionThe object oriented scripting language Ruby supports safely executing untrusted code with two mechanisms: safe level and taint flag on objects. Dr. Yutaka Oiwa discovered a vulnerability that allows Ruby methods to bypass these mechanisms. In systems which use this feature, this could be exploited to execute Ruby code beyond the restrictions specified in each safe level. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20609
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20609
    titleUbuntu 4.10 / 5.04 : ruby1.8 vulnerability (USN-195-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-799.NASL
    descriptionUpdated ruby packages that fix an arbitrary command execution issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. [Updated 25 Oct 2005] Errata has been updated to include missing packages for Red Hat Enterprise Linux 3. Ruby is an interpreted scripting language for object-oriented programming. A bug was found in the way ruby handles eval statements. It is possible for a malicious script to call eval in such a way that can allow the bypass of certain safe-level restrictions. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2337 to this issue. Users of Ruby should update to these erratum packages, which contain a backported patch and are not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id20049
    published2005-10-19
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/20049
    titleRHEL 2.1 / 3 / 4 : ruby (RHSA-2005:799)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-864.NASL
    descriptionYutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed. The following matrix lists the fixed versions in our distributions : old stable (woody) stable (sarge) unstable (sid) ruby 1.6.7-3woody5 n/a n/a ruby1.6 n/a 1.6.8-12sarge1 1.6.8-13 ruby1.8 n/a 1.8.2-7sarge2 1.8.3-1
    last seen2020-06-01
    modified2020-06-02
    plugin id20019
    published2005-10-19
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20019
    titleDebian DSA-864-1 : ruby1.8 - programming error
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2006-003.NASL
    descriptionThe remote host is running Apple Mac OS X, but lacks Security Update 2006-003. This security update contains fixes for the following applications : AppKit ImageIO BOM CFNetwork ClamAV (Mac OS X Server only) CoreFoundation CoreGraphics Finder FTPServer Flash Player KeyCHain LaunchServices libcurl Mail MySQL Manager (Mac OS X Server only) Preview QuickDraw QuickTime Streaming Server Ruby Safari
    last seen2020-06-01
    modified2020-06-02
    plugin id21341
    published2006-05-12
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21341
    titleMac OS X Multiple Vulnerabilities (Security Update 2006-003)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_1DAEA60A471911DAB5C60004614CC33D.NASL
    descriptionRuby home page reports : The Object Oriented Scripting Language Ruby supports safely executing an untrusted code with two mechanisms : safe level and taint flag on objects. A vulnerability has been found that allows bypassing these mechanisms. By using the vulnerability, arbitrary code can be executed beyond the restrictions specified in each safe level. Therefore, Ruby has to be updated on all systems that use safe level to execute untrusted code.
    last seen2020-06-01
    modified2020-06-02
    plugin id21394
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21394
    titleFreeBSD : ruby -- vulnerability in the safe level settings (1daea60a-4719-11da-b5c6-0004614cc33d)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-191.NASL
    descriptionYutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed. The updated packages have been patched to address this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id20121
    published2005-11-02
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20121
    titleMandrake Linux Security Advisory : ruby (MDKSA-2005:191)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-862.NASL
    descriptionYutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed. The following matrix lists the fixed versions in our distributions : old stable (woody) stable (sarge) unstable (sid) ruby 1.6.7-3woody5 n/a n/a ruby1.6 n/a 1.6.8-12sarge1 1.6.8-13 ruby1.8 n/a 1.8.2-7sarge2 1.8.3-1
    last seen2020-06-01
    modified2020-06-02
    plugin id19970
    published2005-10-11
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19970
    titleDebian DSA-862-1 : ruby1.6 - programming error
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-196-1.NASL
    descriptionUlf Harnhammar discovered a format string vulnerability in the CDDB module
    last seen2020-06-01
    modified2020-06-02
    plugin id20610
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20610
    titleUbuntu 4.10 / 5.04 : xine-lib vulnerability (USN-196-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-860.NASL
    descriptionYutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed. The following matrix lists the fixed versions in our distributions : old stable (woody) stable (sarge) unstable (sid) ruby 1.6.7-3woody5 n/a n/a ruby1.6 n/a 1.6.8-12sarge1 1.6.8-13 ruby1.8 n/a 1.8.2-7sarge2 1.8.3-1
    last seen2020-06-01
    modified2020-06-02
    plugin id19968
    published2005-10-11
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19968
    titleDebian DSA-860-1 : ruby - programming error
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200510-05.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200510-05 (Ruby: Security bypass vulnerability) Dr. Yutaka Oiwa discovered that Ruby fails to properly enforce safe level protections. Impact : An attacker could exploit this vulnerability to execute arbitrary code beyond the restrictions specified in each safe level. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id19975
    published2005-10-11
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19975
    titleGLSA-200510-05 : Ruby: Security bypass vulnerability
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2005-799.NASL
    descriptionUpdated ruby packages that fix an arbitrary command execution issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. [Updated 25 Oct 2005] Errata has been updated to include missing packages for Red Hat Enterprise Linux 3. Ruby is an interpreted scripting language for object-oriented programming. A bug was found in the way ruby handles eval statements. It is possible for a malicious script to call eval in such a way that can allow the bypass of certain safe-level restrictions. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2337 to this issue. Users of Ruby should update to these erratum packages, which contain a backported patch and are not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21860
    published2006-07-03
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21860
    titleCentOS 3 / 4 : ruby (CESA-2005:799)

Oval

accepted2013-04-29T04:06:43.465-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionRuby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
familyunix
idoval:org.mitre.oval:def:10564
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleRuby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
version26

Redhat

advisories
rhsa
idRHSA-2005:799
rpms
  • irb-0:1.6.8-9.EL3.4
  • irb-0:1.8.1-7.EL4.2
  • ruby-0:1.6.8-9.EL3.4
  • ruby-0:1.8.1-7.EL4.2
  • ruby-debuginfo-0:1.6.8-9.EL3.4
  • ruby-debuginfo-0:1.8.1-7.EL4.2
  • ruby-devel-0:1.6.8-9.EL3.4
  • ruby-devel-0:1.8.1-7.EL4.2
  • ruby-docs-0:1.6.8-9.EL3.4
  • ruby-docs-0:1.8.1-7.EL4.2
  • ruby-libs-0:1.6.8-9.EL3.4
  • ruby-libs-0:1.8.1-7.EL4.2
  • ruby-mode-0:1.6.8-9.EL3.4
  • ruby-mode-0:1.8.1-7.EL4.2
  • ruby-tcltk-0:1.6.8-9.EL3.4
  • ruby-tcltk-0:1.8.1-7.EL4.2