First published: Tue Nov 13 2007(Updated: )
Ruby is an interpreted scripting language for object-oriented programming.<br>A flaw was discovered in the way Ruby's CGI module handles certain HTTP<br>requests. If a remote attacker sends a specially crafted request, it is<br>possible to cause the ruby CGI script to enter an infinite loop, possibly<br>causing a denial of service. (CVE-2006-6303)<br>An SSL certificate validation flaw was discovered in several Ruby Net<br>modules. The libraries were not checking the requested host name against<br>the common name (CN) in the SSL server certificate, possibly allowing a man<br>in the middle attack. (CVE-2007-5162, CVE-2007-5770)<br>Users of Ruby should upgrade to these updated packages, which contain<br>backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2007:0961 is classified as moderate.
To fix RHSA-2007:0961, update to the latest version of Ruby that addresses this CGI module vulnerability.
Exploiting RHSA-2007:0961 could allow an attacker to cause the Ruby CGI script to enter an infinite loop.
Any systems running vulnerable versions of Ruby's CGI module are at risk from RHSA-2007:0961.
You can check if your system is running an affected version of Ruby's CGI module that has not been patched to mitigate the vulnerability.