CVE Reference: CVE-2008-3655

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2008-3655

Description:
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/44369

UBUNTU
  http://www.ubuntulinux.org/support/documentation/usn/usn-651-1

ST
  1020656

SAID
  Secunia Advisory: SA32372
  Secunia Advisory: SA32371
  Secunia Advisory: SA32219
  Secunia Advisory: SA32165
  Secunia Advisory: SA32256
  Secunia Advisory: SA32255
  Secunia Advisory: SA35074
  Secunia Advisory: SA31697
  Secunia Advisory: SA31430
  Secunia Advisory: SA33178

REDHAT
  http://www.redhat.com/support/errata/RHSA-2008-0895.html
  http://www.redhat.com/support/errata/RHSA-2008-0897.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11602

GENTOO
  http://security.gentoo.org/glsa/glsa-200812-17.xml

FEDORA

DEBIAN
  http://www.debian.org/security/2008/dsa-1652
  http://www.debian.org/security/2008/dsa-1651

CONFIRM
  http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
  http://support.apple.com/kb/HT3549
  http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264
  http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401

CERT
  http://www.us-cert.gov/cas/techalerts/TA09-133A.html

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/495884/100/0/threaded

BID
  30644

APPLE
  http://lists.apple.com/archives/security-announce/2009/May/msg00002.html


Return to the previous page.