First published: Sun Feb 20 2011(Updated: )
A security flaw was found in the Ruby method, translating message of the exception into string representation. An attacker could use this flaw to modify arbitrary untainted strings into their tainted equivalents by tricking the safe level mechanism of this method. References: [1] <a href="http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/">http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/</a> Upstream patch (against ruby_1_8 branch): [2] <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=30903">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=30903</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | =1.8.6 | |
Ruby | =1.8.6-420 | |
Ruby | =1.8.7 | |
Ruby | =1.8.7-330 | |
Ruby | =1.8.8-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1005 has been classified as a moderate severity vulnerability.
To fix CVE-2011-1005, upgrade to a patched version of Ruby that addresses this security flaw.
CVE-2011-1005 affects Ruby versions 1.8.6, 1.8.7, and 1.8.8-dev.
The impact of CVE-2011-1005 allows an attacker to manipulate arbitrary untainted strings if they successfully exploit the flaw.
CVE-2011-1005 can be exploited using manipulation of the safe level mechanism within Ruby.