Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.703157 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 3157-1 (ruby1.9.1 - security update) |
Summary: | Multiple vulnerabilities were;discovered in the interpreter for the Ruby language:;;CVE-2014-4975;The encodes() function in pack.c had an off-by-one error that could;lead to a stack-based buffer overflow. This could allow remote;attackers to cause a denial of service (crash) or arbitrary code;execution.;;CVE-2014-8080,;CVE-2014-8090;The REXML parser could be coerced into allocating large string;objects that could consume all available memory on the system. This;could allow remote attackers to cause a denial of service (crash). |
Description: | Summary: Multiple vulnerabilities were discovered in the interpreter for the Ruby language: CVE-2014-4975 The encodes() function in pack.c had an off-by-one error that could lead to a stack-based buffer overflow. This could allow remote attackers to cause a denial of service (crash) or arbitrary code execution. CVE-2014-8080, CVE-2014-8090 The REXML parser could be coerced into allocating large string objects that could consume all available memory on the system. This could allow remote attackers to cause a denial of service (crash). Affected Software/OS: ruby1.9.1 on Debian Linux Solution: For the stable distribution (wheezy), these problems have been fixed in version 1.9.3.194-8.1+deb7u3. For the upcoming stable distribution (jessie), these problems have been fixed in version 2.1.5-1 of the ruby2.1 source package. For the unstable distribution (sid), these problems have been fixed in version 2.1.5-1 of the ruby2.1 source package. We recommend that you upgrade your ruby1.9.1 packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-4975 BugTraq ID: 68474 http://www.securityfocus.com/bid/68474 Debian Security Information: DSA-3157 (Google Search) http://www.debian.org/security/2015/dsa-3157 http://www.mandriva.com/security/advisories?name=MDVSA-2015:129 http://www.openwall.com/lists/oss-security/2014/07/09/13 RedHat Security Advisories: RHSA-2014:1912 http://rhn.redhat.com/errata/RHSA-2014-1912.html RedHat Security Advisories: RHSA-2014:1913 http://rhn.redhat.com/errata/RHSA-2014-1913.html RedHat Security Advisories: RHSA-2014:1914 http://rhn.redhat.com/errata/RHSA-2014-1914.html http://www.ubuntu.com/usn/USN-2397-1 XForce ISS Database: ruby-cve20144975-bo(94706) https://exchange.xforce.ibmcloud.com/vulnerabilities/94706 Common Vulnerability Exposure (CVE) ID: CVE-2014-8080 http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html BugTraq ID: 70935 http://www.securityfocus.com/bid/70935 Debian Security Information: DSA-3159 (Google Search) http://www.debian.org/security/2015/dsa-3159 RedHat Security Advisories: RHSA-2014:1911 http://rhn.redhat.com/errata/RHSA-2014-1911.html http://secunia.com/advisories/61607 http://secunia.com/advisories/62050 http://secunia.com/advisories/62748 SuSE Security Announcement: openSUSE-SU-2014:1589 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html SuSE Security Announcement: openSUSE-SU-2015:0002 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html SuSE Security Announcement: openSUSE-SU-2015:0007 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html Common Vulnerability Exposure (CVE) ID: CVE-2014-8090 BugTraq ID: 71230 http://www.securityfocus.com/bid/71230 http://secunia.com/advisories/59948 http://www.ubuntu.com/usn/USN-2412-1 |
Copyright | Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |