Ubuntu 12.04 LTS : ruby1.9.1 vulnerabilities (USN-1583-1)

Ubuntu Security Notice (C) 2012-2013 Canonical, Inc. / NASL script (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that Ruby incorrectly allowed untainted strings to
be modified in protective safe levels. An attacker could use this flaw
to bypass intended access restrictions. (CVE-2011-1005)

John Firebaugh discovered that the RubyGems remote gem fetcher did not
properly verify SSL certificates. A remote attacker could exploit this
to perform a man in the middle attack to alter gem files being
downloaded for installation. (CVE-2012-2126)

John Firebaugh discovered that the RubyGems remote gem fetcher allowed
redirection from HTTPS to HTTP. A remote attacker could exploit this
to perform a man in the middle attack to alter gem files being
downloaded for installation. (CVE-2012-2125).

Solution :

Update the affected libruby1.9.1 package.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 62307 ()

Bugtraq ID: 46458
53174

CVE ID: CVE-2011-1005
CVE-2012-2125
CVE-2012-2126