First published: Wed Aug 13 2008(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2008-3656">CVE-2008-3656</a> to the following vulnerability: Algorithmic complexity vulnerability in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.5 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression. Refences: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401</a> <a href="http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/">http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | <=1.8.5>=1.8.5<1.8.6-p286>=1.8.7<1.8.7-p71>=1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-458953 is classified as a moderate risk due to its impact on algorithmic complexity in WEBrick.
To fix REDHAT-BUG-458953, upgrade Ruby to version 1.9 or later, or apply any available security patches for affected versions.
Ruby versions 1.8.5 and earlier, and specific versions up to 1.8.6-p286 and 1.8.7-p71 are affected by REDHAT-BUG-458953.
Yes, REDHAT-BUG-458953 is specifically related to an algorithmic complexity vulnerability in WEBrick's DefaultFileHandler.
Yes, REDHAT-BUG-458953 is documented in multiple security advisories and bug reports that outline the vulnerability.