Amazon Linux AMI : ruby Heap Overflow Vulnerability (ALAS-2013-248)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

As described upstream at ruby-lang.org, 'any time a string is
converted to a floating point value, a specially crafted string can
cause a heap overflow. This can lead to a denial of service attack via
segmentation faults and possibly arbitrary code execution. Any program
that converts input of unknown origin to floating point values
(especially common when accepting JSON) are vulnerable.'

See also :

http://www.nessus.org/u?02b4af61
http://www.nessus.org/u?cb543f6d

Solution :

Run 'yum update ruby' to update your system.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 71079 ()

Bugtraq ID:

CVE ID: CVE-2013-4164