Rapid7 Vulnerability & Exploit Database

RHSA-2012:0069: ruby security update

Back to Search

RHSA-2012:0069: ruby security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
12/29/2011
Created
07/25/2018
Added
02/02/2012
Modified
07/04/2017

Description

Ruby is an extensible, interpreted, object-oriented, scripting language. Ithas features to process text files and to do system management tasks.A denial of service flaw was found in the implementation of associativearrays (hashes) in Ruby. An attacker able to supply a large number ofinputs to a Ruby application (such as HTTP POST request parameters sent toa web application) that are used as keys when inserting data into an arraycould trigger multiple hash function collisions, making array operationstake an excessive amount of CPU time. To mitigate this issue, randomizationhas been added to the hash function to reduce the chance of an attackersuccessfully causing intentional collisions. (CVE-2011-4815)Red Hat would like to thank oCERT for reporting this issue. oCERTacknowledges Julian Wälde and Alexander Klink as the original reporters.All users of ruby are advised to upgrade to these updated packages, whichcontain a backported patch to resolve this issue.

Solution(s)

  • redhat-upgrade-ruby
  • redhat-upgrade-ruby-debuginfo
  • redhat-upgrade-ruby-devel
  • redhat-upgrade-ruby-docs
  • redhat-upgrade-ruby-irb
  • redhat-upgrade-ruby-libs
  • redhat-upgrade-ruby-rdoc
  • redhat-upgrade-ruby-ri
  • redhat-upgrade-ruby-static
  • redhat-upgrade-ruby-tcltk

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;