CVE Reference: CVE-2008-3657

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2008-3657

Description:
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/44372

UBUNTU
  http://www.ubuntulinux.org/support/documentation/usn/usn-651-1

ST
  1020652

SAID
  Secunia Advisory: SA32165
  Secunia Advisory: SA31430
  Secunia Advisory: SA33178
  Secunia Advisory: SA32256
  Secunia Advisory: SA35074
  Secunia Advisory: SA31697
  Secunia Advisory: SA32255
  Secunia Advisory: SA32219
  Secunia Advisory: SA32371

REDHAT
  http://www.redhat.com/support/errata/RHSA-2008-0897.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9793

GENTOO
  http://security.gentoo.org/glsa/glsa-200812-17.xml

FEDORA

DEBIAN
  http://www.debian.org/security/2008/dsa-1652
  http://www.debian.org/security/2008/dsa-1651

CONFIRM
  http://support.apple.com/kb/HT3549
  http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
  http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264
  http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401

CERT
  http://www.us-cert.gov/cas/techalerts/TA09-133A.html

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/495884/100/0/threaded

BID
  30644

APPLE
  http://lists.apple.com/archives/security-announce/2009/May/msg00002.html


Return to the previous page.