First published: Thu Oct 17 2013(Updated: )
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actionmailer | >=3.0.0<3.2.15 | 3.2.15 |
Ruby on Rails | >=3.0.0<3.2.15 | |
SUSE Linux | =12.2 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4389 is considered a high severity vulnerability as it can lead to denial of service for affected systems.
To fix CVE-2013-4389, upgrade to Action Mailer version 3.2.15 or later.
CVE-2013-4389 affects Ruby on Rails 3.x versions prior to 3.2.15, as well as specific versions of OpenSUSE and Debian.
Yes, CVE-2013-4389 can be exploited remotely through crafted email addresses.
The vulnerability in CVE-2013-4389 exists in the log_subscriber component of Action Mailer.