This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote Amazon Linux AMI host is missing a security update.
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0
before revision r37068 allows context-dependent attackers to bypass
safe-level restrictions and modify untainted strings via the
name_err_mesg_to_str API function, which marks the string as tainted,
a different vulnerability than CVE-2011-1005 .
See also :
Run 'yum update ruby' to update your system.
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Amazon Linux Local Security Checks
Nessus Plugin ID: 69629 ()
CVE ID: CVE-2012-4466
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.