Vulnerabilities > CVE-2008-4310 - Resource Management Errors vulnerability in Ruby-Lang Ruby 1.8.1/1.8.5

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ruby-lang
CWE-399
nessus
exploit available

Summary

httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.

Vulnerable Configurations

Part Description Count
Application
Ruby-Lang
2

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionRuby 1.9 WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request DoS. CVE-2008-3656,CVE-2008-4310. Dos exploits for multiple platform
idEDB-ID:32222
last seen2016-02-03
modified2008-08-11
published2008-08-11
reporterKeita Yamaguchi
sourcehttps://www.exploit-db.com/download/32222/
titleRuby <= 1.9 WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request DoS

Nessus

  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2008-0897.NASL
    descriptionFrom Red Hat Security Advisory 2008:0897 : Updated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs and a fixed source port when sending DNS requests. A remote attacker could use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905) Ruby
    last seen2020-06-01
    modified2020-06-02
    plugin id67752
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67752
    titleOracle Linux 4 / 5 : ruby (ELSA-2008-0897)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2008-0981.NASL
    descriptionFrom Red Hat Security Advisory 2008:0981 : Updated ruby packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310) All Ruby users should upgrade to these updated packages, which contain a correct patch that resolves this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id67767
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67767
    titleOracle Linux 4 / 5 : ruby (ELSA-2008-0981)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0897.NASL
    descriptionUpdated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs and a fixed source port when sending DNS requests. A remote attacker could use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905) Ruby
    last seen2020-06-01
    modified2020-06-02
    plugin id34466
    published2008-10-22
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/34466
    titleRHEL 4 / 5 : ruby (RHSA-2008:0897)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2008-0897.NASL
    descriptionUpdated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs and a fixed source port when sending DNS requests. A remote attacker could use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905) Ruby
    last seen2020-06-01
    modified2020-06-02
    plugin id34502
    published2008-10-28
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/34502
    titleCentOS 4 / 5 : ruby (CESA-2008:0897)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20081204_RUBY_ON_SL4_X.NASL
    descriptionVincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310)
    last seen2020-06-01
    modified2020-06-02
    plugin id60502
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60502
    titleScientific Linux Security Update : ruby on SL4.x, SL5.x i386/x86_64
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2008-0981.NASL
    descriptionUpdated ruby packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310) All Ruby users should upgrade to these updated packages, which contain a correct patch that resolves this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id35263
    published2008-12-26
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35263
    titleCentOS 4 / 5 : ruby (CESA-2008:0981)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0981.NASL
    descriptionUpdated ruby packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310) All Ruby users should upgrade to these updated packages, which contain a correct patch that resolves this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id35038
    published2008-12-05
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35038
    titleRHEL 4 / 5 : ruby (RHSA-2008:0981)

Oval

accepted2013-04-29T04:04:01.547-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
    ovaloval:org.mitre.oval:def:11414
  • commentThe operating system installed on the system is CentOS Linux 5.x
    ovaloval:org.mitre.oval:def:15802
  • commentOracle Linux 5.x
    ovaloval:org.mitre.oval:def:15459
descriptionhttputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.
familyunix
idoval:org.mitre.oval:def:10250
statusaccepted
submitted2010-07-09T03:56:16-04:00
titlehttputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.
version27

Redhat

advisories
bugzilla
id470252
titleCVE-2008-4310 ruby: Incomplete fix for CVE-2008-3656
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentruby is earlier than 0:1.8.1-7.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20080981001
        • commentruby is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427010
      • AND
        • commentirb is earlier than 0:1.8.1-7.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20080981003
        • commentirb is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427004
      • AND
        • commentruby-docs is earlier than 0:1.8.1-7.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20080981005
        • commentruby-docs is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427012
      • AND
        • commentruby-libs is earlier than 0:1.8.1-7.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20080981007
        • commentruby-libs is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427006
      • AND
        • commentruby-mode is earlier than 0:1.8.1-7.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20080981009
        • commentruby-mode is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427002
      • AND
        • commentruby-devel is earlier than 0:1.8.1-7.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20080981011
        • commentruby-devel is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427014
      • AND
        • commentruby-tcltk is earlier than 0:1.8.1-7.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20080981013
        • commentruby-tcltk is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060427008
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • commentruby-docs is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981016
        • commentruby-docs is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965012
      • AND
        • commentruby-libs is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981018
        • commentruby-libs is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965014
      • AND
        • commentruby-mode is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981020
        • commentruby-mode is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965016
      • AND
        • commentruby-rdoc is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981022
        • commentruby-rdoc is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965018
      • AND
        • commentruby-ri is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981024
        • commentruby-ri is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965002
      • AND
        • commentruby-devel is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981026
        • commentruby-devel is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965004
      • AND
        • commentruby-tcltk is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981028
        • commentruby-tcltk is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965006
      • AND
        • commentruby-irb is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981030
        • commentruby-irb is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965008
      • AND
        • commentruby is earlier than 0:1.8.5-5.el5_2.6
          ovaloval:com.redhat.rhsa:tst:20080981032
        • commentruby is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070965010
rhsa
idRHSA-2008:0981
released2008-12-04
severityModerate
titleRHSA-2008:0981: ruby security update (Moderate)
rpms
  • irb-0:1.8.1-7.el4_7.2
  • ruby-0:1.8.1-7.el4_7.2
  • ruby-0:1.8.5-5.el5_2.6
  • ruby-debuginfo-0:1.8.1-7.el4_7.2
  • ruby-debuginfo-0:1.8.5-5.el5_2.6
  • ruby-devel-0:1.8.1-7.el4_7.2
  • ruby-devel-0:1.8.5-5.el5_2.6
  • ruby-docs-0:1.8.1-7.el4_7.2
  • ruby-docs-0:1.8.5-5.el5_2.6
  • ruby-irb-0:1.8.5-5.el5_2.6
  • ruby-libs-0:1.8.1-7.el4_7.2
  • ruby-libs-0:1.8.5-5.el5_2.6
  • ruby-mode-0:1.8.1-7.el4_7.2
  • ruby-mode-0:1.8.5-5.el5_2.6
  • ruby-rdoc-0:1.8.5-5.el5_2.6
  • ruby-ri-0:1.8.5-5.el5_2.6
  • ruby-tcltk-0:1.8.1-7.el4_7.2
  • ruby-tcltk-0:1.8.5-5.el5_2.6