First published: Fri Aug 05 2011(Updated: )
Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | <=1.8.6 | |
Ruby | =1.8.6-p110 | |
Ruby | =1.8.6-p36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3009 is categorized as a medium severity vulnerability due to its impact on predictability of random number generation.
To fix CVE-2011-3009, upgrade Ruby to version 1.8.6-p114 or later, where the random seed is correctly reset upon forking.
CVE-2011-3009 affects Ruby versions prior to 1.8.6-p114, including version 1.8.6-p110 and certain earlier patch levels.
CVE-2011-3009 is not typically exploitable remotely as it requires context-dependent conditions within the affected application.
Exploiting CVE-2011-3009 could allow attackers to predict random values, potentially leading to vulnerabilities in cryptographic functionalities.