This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated ruby packages that fix an arbitrary command execution issue
are now available.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
Ruby is an interpreted scripting language for object-oriented
A bug was found in the way Ruby launched an XMLRPC server. If an
XMLRPC server is launched in a certain way, it becomes possible for a
remote attacker to execute arbitrary commands within the XMLRPC
server. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-1992 to this issue.
Users of Ruby should update to these erratum packages, which contain a
backported patch and are not vulnerable to this issue.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 19390 ()
Bugtraq ID: 14016
CVE ID: CVE-2005-1992
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.