Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0808122032490.26550@faron.mitre.org>
Date: Tue, 12 Aug 2008 20:35:48 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: coley@...re.org
Subject: Re: CVE id requests: ruby


Seems reasonable to include the DNS issue under CVE-2008-1447.

For the 0.2 people who might wonder why CVE-2008-3655 and CVE-2008-3657
were SPLIT, the first is a case of improperly specified "permissions"
(regardless of the type of "object" being accessed), whereas the latter
involves the failure to use a protection mechanism that happens to be
related to permissions.

- Steve


======================================================
Name: CVE-2008-3655
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Reference: CONFIRM:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

Ruby 1.8.5 and earlier, 1.8.5 through 1.8.6-p286, 1.8.7 through
1.8.7-p71, and 1.9 through r18423 does not properly restrict access to
critical variables and methods at various safe levels, which allows
context-dependent attackers to bypass intended access restrictions via
(1) untrace_var (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and
(4) insecure methods at safe levels 1 through 3.


======================================================
Name: CVE-2008-3656
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Reference: CONFIRM:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

Algorithmic complexity vulnerability in
WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and
earlier, 1.8.5 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9
through r18423 allows context-dependent attackers to cause a denial of
service (CPU consumption) via a crafted HTTP request that is processed
by a backtracking regular expression.


======================================================
Name: CVE-2008-3657
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
Reference: CONFIRM:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/

The dl module in Ruby 1.8.5 and earlier, 1.8.5 through 1.8.6-p286,
1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check
"taintness" of inputs, which allows context-dependent attackers to
bypass safe levels and execute dangerous functions by accessing a
library using DL.dlopen.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.