OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
 
[SA16904] Ruby Safe-Level Security Bypass Vulnerability

From: Secunia Security Advisories (sec-advsecunia.com)
Date: Fri Sep 23 2005 - 09:05:19 CDT


----------------------------------------------------------------------

Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Ruby Safe-Level Security Bypass Vulnerability

SECUNIA ADVISORY ID:
SA16904

VERIFY ADVISORY:
http://secunia.com/advisories/16904/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass

WHERE:
From remote

SOFTWARE:
Ruby 1.8.x
http://secunia.com/product/3787/
Ruby 1.6.x
http://secunia.com/product/5754/

DESCRIPTION:
A vulnerability has been reported in Ruby, which can be exploited by
malicious people to bypass certain security restrictions.

The vulnerability is due in an error in "eval.c" in enforcing
safe-level protections. This can be exploited to execute certain
insecure methods.

The vulnerability has been reported in the following versions:
* Ruby version 1.6.8 and prior (old release).
* Ruby version 1.8.2 and prior (stable).
* Ruby version 1.9.0 2005-09-01 and prior (development).

SOLUTION:
Ruby 1.8.x:
Update to version 1.8.3.
ftp://ftp.ruby-lang.org/pub/ruby/ruby-1.8.3.tar.gz

Ruby 1.6.8:
Apply patch.
ftp://ftp.ruby-lang.org/pub/ruby/1.6/1.6.8-patch1.gz

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Dr. Yutaka Oiwa, Research Center for Information
Security, National Institute of Advanced Industrial Science and
Technology.

ORIGINAL ADVISORY:
JP Vendor Status Notes (Japanese):
http://jvn.jp/jp/JVN%2362914675/243894/index.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories

----------------------------------------------------------------------