First published: Sun Feb 20 2011(Updated: )
A security flaw was found in the Ruby method, translating message of the exception into string representation. An attacker could use this flaw to modify arbitrary untainted strings into their tainted equivalents by tricking the safe level mechanism of this method. References: [1] <a href="http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/">http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/</a> Upstream patch (against ruby_1_8 branch): [2] <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=30903">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=30903</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | <1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-678920 is considered high due to the potential for arbitrary string modification.
To fix REDHAT-BUG-678920, upgrade to a Ruby version higher than 1.8 that addresses this vulnerability.
REDHAT-BUG-678920 is caused by a flaw in the Ruby method that allows the safe level mechanism to be bypassed.
REDHAT-BUG-678920 affects Ruby versions up to 1.8, allowing attackers to manipulate untainted strings.
Developers and applications using vulnerable versions of Ruby are at risk from REDHAT-BUG-678920.