[Japanese]

JVNDB-2006-000858

Ruby vulnerability caused by a problem with the alias funtion so that safe level 4 does not function as a sandbox

Overview

Safe levels exist as a part of the Ruby language security model, in order to limit the operation of untrusted objects. Ruby contains a vulnerability which may allow an attacker to bypass the safe level restrictions and execute normally inaccessible methods, due to a problem in Ruby's alias function.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 1.2 (Low) [IPA Score]
  • Access Vector: Local
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


Ruby
  • Ruby 1.8.4-20060328 and earlier Snapshot versions
MIRACLE LINUX CORPORATION
  • Asianux Server 3.0
  • Asianux Server 3.0 (x86-64)
  • Asianux Server 4.0
  • Asianux Server 4.0 (x86-64)
Red Hat, Inc.
  • Red Hat Enterprise Linux 2.1 (as)
  • Red Hat Enterprise Linux 3 (as)
  • Red Hat Enterprise Linux 4 (as)
  • Red Hat Enterprise Linux 2.1 (es)
  • Red Hat Enterprise Linux 3 (es)
  • Red Hat Enterprise Linux 4 (es)
  • Red Hat Enterprise Linux 2.1 (ws)
  • Red Hat Enterprise Linux 3 (ws)
  • Red Hat Enterprise Linux 4 (ws)

Impact

An attacker could force programs to crash.
Solution

Vendor Information

Ruby MIRACLE LINUX CORPORATION
  • MIRACLE LINUX Update Information : ruby (V3.0) (Japanese)
  • MIRACLE LINUX Update Information : ruby (V4.0) (Japanese)
Red Hat, Inc.
CWE (What is CWE?)

  1. No Mapping(CWE-DesignError) [NVD Evaluation]
CVE (What is CVE?)

  1. CVE-2006-3694
References

  1. JVN : JVN#83768862
  2. National Vulnerability Database (NVD) : CVE-2006-3694
  3. Secunia Advisory : SA21009
  4. SecurityFocus : 18944
  5. FrSIRT Advisories : FrSIRT/ADV-2006-2760
Revision History

  • [2008/05/21]
      Web page published