Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1218483469.8327.12.camel@dhcp-lab-164.englab.brq.redhat.com>
Date: Mon, 11 Aug 2008 21:37:49 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: coley@...re.org
Cc: oss-security@...ts.openwall.com
Subject: Multiple CVE Request (ruby)

Hello Steve,

  Ruby upstream has announced multiple vulnerabilities 
present in Ruby code (even with testcases).

All of these issues responsibly reported at the following
URL:

http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/


Could you please allocate a CVE id for each of the following:

* untrace_var is permitted at safe level 4.

* $PROGRAM_NAME may be modified at safe level 4.

* Insecure methods may be called at safe level 1-3.

* Syslog operations are permitted at safe level 4.

* DoS vulnerability in WEBrick

* Lack of taintness check in dl

* DNS spoofing vulnerability in resolv.rb -- already seems to
  have assigned CVE-2008-1447. 

All of these issues exploitable by a normal unprivileged
user (slightly testcases / exploits modification is needed
in some cases). 

For further reference about the features allowed at different
$SAVE levels in Ruby, please have a look at:

http://www.rubycentral.com/book/taint.html (part "Definition of the safe
levels")

Please do not hesitate to ask for any further information related
with each of these issues and / or their test cases.

Thank you in advance.

Kind regards
Jan iankko Lieskovsky
RH Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.