CVE-2006-6303

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.

References

http://bugs.gentoo.org/show_bug.cgi?id=157048

http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218287

http://docs.info.apple.com/article.html?artnum=305530

http://jvn.jp/jp/JVN%2384798830/index.html

http://lists.apple.com/archives/security-announce/2007/May/msg00004.html

http://secunia.com/advisories/23165

http://secunia.com/advisories/23268

http://secunia.com/advisories/23454

http://secunia.com/advisories/25402

http://secunia.com/advisories/27576

http://secunia.com/advisories/31090

http://security.gentoo.org/glsa/glsa-200612-21.xml

http://securitytracker.com/id?1017363

http://www.mandriva.com/security/advisories?name=MDKSA-2006:225

http://www.novell.com/linux/security/advisories/2007_4_sr.html

http://www.redhat.com/support/errata/RHSA-2007-0961.html

http://www.ruby-lang.org/cgi-bin/cvsweb.cgi/ruby/lib/cgi.rb.diff?f=h&only_with_tag=MAIN&r1=text&tr1=1.92&r2=text&tr2=1.91

http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/

http://www.securityfocus.com/bid/21441

http://www.ubuntu.com/usn/usn-394-1

http://www.vupen.com/english/advisories/2006/4855

http://www.vupen.com/english/advisories/2007/1939

https://exchange.xforce.ibmcloud.com/vulnerabilities/30734

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10529

Details

Source: MITRE

Published: 2006-12-06

Updated: 2017-10-11

Type: CWE-399

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
67717Oracle Linux 3 : ruby (ELSA-2008-0562)NessusOracle Linux Local Security Checks
critical
67584Oracle Linux 4 : ruby (ELSA-2007-0961)NessusOracle Linux Local Security Checks
medium
60441Scientific Linux Security Update : ruby on SL3.x i386/x86_64NessusScientific Linux Local Security Checks
critical
60301Scientific Linux Security Update : ruby on SL5.x, SL4.x i386/x86_64NessusScientific Linux Local Security Checks
medium
41118SuSE9 Security Update : ruby (YOU Patch Number 11442)NessusSuSE Local Security Checks
medium
37552CentOS 4 : ruby (CESA-2007:0961)NessusCentOS Local Security Checks
medium
33496RHEL 2.1 / 3 : ruby (RHSA-2008:0562)NessusRed Hat Local Security Checks
critical
33489CentOS 3 : ruby (CESA-2008:0562)NessusCentOS Local Security Checks
critical
29572SuSE 10 Security Update : ruby (ZYPP Patch Number 2654)NessusSuSE Local Security Checks
medium
28201RHEL 4 : ruby (RHSA-2007:0961)NessusRed Hat Local Security Checks
medium
27980Ubuntu 5.10 / 6.06 LTS / 6.10 : ruby1.8 vulnerability (USN-394-1)NessusUbuntu Local Security Checks
medium
27423openSUSE 10 Security Update : ruby (ruby-2655)NessusSuSE Local Security Checks
medium
25297Mac OS X Multiple Vulnerabilities (Security Update 2007-005)NessusMacOS X Local Security Checks
critical
24609Mandrake Linux Security Advisory : ruby (MDKSA-2006:225)NessusMandriva Local Security Checks
medium
23958GLSA-200612-21 : Ruby: Denial of Service vulnerabilityNessusGentoo Local Security Checks
medium
23771FreeBSD : ruby -- cgi.rb library Denial of Service (a8674c14-83d7-11db-88d5-0012f06707f0)NessusFreeBSD Local Security Checks
medium