First published: Wed Oct 03 2012(Updated: )
Originally, Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2011-1005">CVE-2011-1005</a> to the following vulnerability: The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname. Later it was reported: [1] <a href="http://www.openwall.com/lists/oss-security/2012/10/02/4">http://www.openwall.com/lists/oss-security/2012/10/02/4</a> that the Ruby name_err_mesg_to_str() method is vulnerable to the similar flaw. Relevant upstream patch: [2] <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ruby | <1.9.3 | 1.9.3 |
redhat/ruby | <1.8.7 | 1.8.7 |
Ruby | =1.8.7 | |
Ruby | =1.8.7-p160 | |
Ruby | =1.8.7-p17 | |
Ruby | =1.8.7-p173 | |
Ruby | =1.8.7-p174 | |
Ruby | =1.8.7-p22 | |
Ruby | =1.8.7-p248 | |
Ruby | =1.8.7-p249 | |
Ruby | =1.8.7-p299 | |
Ruby | =1.8.7-p301 | |
Ruby | =1.8.7-p302 | |
Ruby | =1.8.7-p330 | |
Ruby | =1.8.7-p334 | |
Ruby | =1.8.7-p352 | |
Ruby | =1.8.7-p357 | |
Ruby | =1.8.7-p358 | |
Ruby | =1.8.7-p370 | |
Ruby | =1.8.7-p71 | |
Ruby | =1.8.7-p72 | |
Ruby | =1.8.7-preview1 | |
Ruby | =1.8.7-preview2 | |
Ruby | =1.8.7-preview3 | |
Ruby | =1.8.7-preview4 | |
Ruby | =1.9.3 | |
Ruby | =1.9.3-p0 | |
Ruby | =1.9.3-p125 | |
Ruby | =1.9.3-p194 | |
Ruby | =2.0 | |
Ruby | =2.0.0 | |
Ruby | =2.0.0-p0 | |
Ruby | =2.0.0-preview1 | |
Ruby | =2.0.0-preview2 | |
Ruby | =2.0.0-rc1 | |
Ruby | =2.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4466 has been classified as having a medium severity level.
CVE-2012-4466 impacts Ruby versions 1.8.6 through 1.8.7-330, and 1.9.3 and prior.
To mitigate CVE-2012-4466, upgrade to Ruby versions 1.9.3 or higher.
CVE-2012-4466 is a vulnerability related to Ruby's safe-level feature.
Yes, patches for CVE-2012-4466 are included in the newer Ruby releases.