First published: Fri Oct 05 2012(Updated: )
Originally, Common Vulnerabilities and Exposures assigned an identifier of <a href="https://access.redhat.com/security/cve/CVE-2011-1005">CVE-2011-1005</a> to the following vulnerability: The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname. with the following upstream patch: [1] <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?revision=30903&view=revision">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?revision=30903&view=revision</a> Based on later upstream patch for different (<a href="https://access.redhat.com/security/cve/CVE-2012-4464">CVE-2012-4464</a> and <a href="https://access.redhat.com/security/cve/CVE-2012-4466">CVE-2012-4466</a>) issues: [2] <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068</a> it was found that original upstream 1.8.x ruby patch for <a href="https://access.redhat.com/security/cve/CVE-2011-1005">CVE-2011-1005</a> issue was not complete, when the NameError#to_s() method was used on / with Ruby objects (the test logic in 'test_to_s_taintness_propagation' test from [1] was actually reversed, so the test returned success also on still vulnerable instances). Acknowledgements: This issue was discovered by Vit Ondruch of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | =1.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.