Rapid7 Vulnerability & Exploit Database

RHSA-2013:1090: ruby security update

Back to Search

RHSA-2013:1090: ruby security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
07/17/2013
Created
07/25/2018
Added
07/18/2013
Modified
07/04/2017

Description

Ruby is an extensible, interpreted, object-oriented, scripting language.It has features to process text files and to do system management tasks.A flaw was found in Ruby's SSL client's hostname identity check whenhandling certificates that contain hostnames with NULL bytes. An attackercould potentially exploit this flaw to conduct man-in-the-middle attacks tospoof SSL servers. Note that to exploit this issue, an attacker would needto obtain a carefully-crafted certificate signed by an authority that theclient trusts. (CVE-2013-4073)All users of Ruby are advised to upgrade to these updated packages, whichcontain backported patches to resolve this issue.

Solution(s)

  • redhat-upgrade-ruby
  • redhat-upgrade-ruby-debuginfo
  • redhat-upgrade-ruby-devel
  • redhat-upgrade-ruby-docs
  • redhat-upgrade-ruby-irb
  • redhat-upgrade-ruby-libs
  • redhat-upgrade-ruby-mode
  • redhat-upgrade-ruby-rdoc
  • redhat-upgrade-ruby-ri
  • redhat-upgrade-ruby-static
  • redhat-upgrade-ruby-tcltk

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;