Vulnerabilities > CVE-2006-1931 - Denial of Service vulnerability in Yukihiro Matsumoto Ruby XMLRPC Server

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
yukihiro-matsumoto
nessus
exploit available

Summary

The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.

Exploit-Db

descriptionYukihiro Matsumoto Ruby 1.x XMLRPC Server Denial of Service Vulnerability. CVE-2006-1931. Dos exploit for linux platform
idEDB-ID:27723
last seen2016-02-03
modified2006-04-21
published2006-04-21
reporterTanaka Akira
sourcehttps://www.exploit-db.com/download/27723/
titleYukihiro Matsumoto Ruby 1.x XMLRPC Server Denial of Service Vulnerability

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0427.NASL
    descriptionUpdated ruby packages that fix a denial of service issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for object-oriented programming. A bug was found in the way Ruby creates its xmlrpc and http servers. The servers use a non blocking socket, which enables a remote user to cause a denial of service condition if they are able to transmit a large volume of information from the network server. (CVE-2006-1931) Users of Ruby should update to these erratum packages, which contain a backported patch and are not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21366
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21366
    titleRHEL 4 : ruby (RHSA-2006:0427)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2006-0427.NASL
    descriptionUpdated ruby packages that fix a denial of service issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for object-oriented programming. A bug was found in the way Ruby creates its xmlrpc and http servers. The servers use a non blocking socket, which enables a remote user to cause a denial of service condition if they are able to transmit a large volume of information from the network server. (CVE-2006-1931) Users of Ruby should update to these erratum packages, which contain a backported patch and are not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21995
    published2006-07-05
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21995
    titleCentOS 4 : ruby (CESA-2006:0427)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-079.NASL
    descriptionA vulnerability in how ruby
    last seen2020-06-01
    modified2020-06-02
    plugin id21285
    published2006-04-26
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21285
    titleMandrake Linux Security Advisory : ruby (MDKSA-2006:079)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1157.NASL
    descriptionSeveral vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to the bypass of security restrictions or denial of service. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2006-1931 It was discovered that the use of blocking sockets can lead to denial of service. - CVE-2006-3964 It was discovered that Ruby does not properly maintain
    last seen2020-06-01
    modified2020-06-02
    plugin id22699
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22699
    titleDebian DSA-1157-1 : ruby1.8 - several vulnerabilities
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200605-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200605-11 (Ruby: Denial of Service) Ruby uses blocking sockets for WEBrick and XMLRPC servers. Impact : An attacker could send large amounts of data to an affected server to block the socket and thus deny other connections to the server. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id21353
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21353
    titleGLSA-200605-11 : Ruby: Denial of Service
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-273-1.NASL
    descriptionYukihiro Matsumoto reported that Ruby
    last seen2020-06-01
    modified2020-06-02
    plugin id21292
    published2006-04-26
    reporterUbuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21292
    titleUbuntu 4.10 / 5.04 / 5.10 : ruby1.8 vulnerability (USN-273-1)

Oval

accepted2013-04-29T04:11:31.157-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionThe HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.
familyunix
idoval:org.mitre.oval:def:11100
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleThe HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.
version26

Redhat

advisories
bugzilla
id189539
titleCVE-2006-1931 Ruby http/xmlrpc server DoS
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentruby-mode is earlier than 0:1.8.1-7.EL4.3
          ovaloval:com.redhat.rhsa:tst:20060427001
        • commentruby-mode is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427002
      • AND
        • commentirb is earlier than 0:1.8.1-7.EL4.3
          ovaloval:com.redhat.rhsa:tst:20060427003
        • commentirb is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427004
      • AND
        • commentruby-libs is earlier than 0:1.8.1-7.EL4.3
          ovaloval:com.redhat.rhsa:tst:20060427005
        • commentruby-libs is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427006
      • AND
        • commentruby-tcltk is earlier than 0:1.8.1-7.EL4.3
          ovaloval:com.redhat.rhsa:tst:20060427007
        • commentruby-tcltk is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427008
      • AND
        • commentruby is earlier than 0:1.8.1-7.EL4.3
          ovaloval:com.redhat.rhsa:tst:20060427009
        • commentruby is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427010
      • AND
        • commentruby-docs is earlier than 0:1.8.1-7.EL4.3
          ovaloval:com.redhat.rhsa:tst:20060427011
        • commentruby-docs is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427012
      • AND
        • commentruby-devel is earlier than 0:1.8.1-7.EL4.3
          ovaloval:com.redhat.rhsa:tst:20060427013
        • commentruby-devel is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427014
rhsa
idRHSA-2006:0427
released2006-05-09
severityModerate
titleRHSA-2006:0427: ruby security update (Moderate)
rpms
  • irb-0:1.8.1-7.EL4.3
  • ruby-0:1.8.1-7.EL4.3
  • ruby-debuginfo-0:1.8.1-7.EL4.3
  • ruby-devel-0:1.8.1-7.EL4.3
  • ruby-docs-0:1.8.1-7.EL4.3
  • ruby-libs-0:1.8.1-7.EL4.3
  • ruby-mode-0:1.8.1-7.EL4.3
  • ruby-tcltk-0:1.8.1-7.EL4.3