CVE-2013-1821

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525

http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html

http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html

http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html

http://rhn.redhat.com/errata/RHSA-2013-0611.html

http://rhn.redhat.com/errata/RHSA-2013-0612.html

http://rhn.redhat.com/errata/RHSA-2013-1028.html

http://rhn.redhat.com/errata/RHSA-2013-1147.html

http://secunia.com/advisories/52783

http://secunia.com/advisories/52902

http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384

http://www.debian.org/security/2013/dsa-2738

http://www.debian.org/security/2013/dsa-2809

http://www.mandriva.com/security/advisories?name=MDVSA-2013:124

http://www.openwall.com/lists/oss-security/2013/03/06/5

http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/

http://www.securityfocus.com/bid/58141

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862

http://www.ubuntu.com/usn/USN-1780-1

https://bugzilla.redhat.com/show_bug.cgi?id=914716

https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092

Details

Source: MITRE

Published: 2013-04-09

Updated: 2016-12-08

Type: CWE-20

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
79980GLSA-201412-27 : Ruby: Denial of ServiceNessusGentoo Local Security Checks
high
74955openSUSE Security Update : ruby (openSUSE-SU-2013:0603-1)NessusSuSE Local Security Checks
high
74118SuSE 11.3 Security Update : Ruby (SAT Patch Number 9136)NessusSuSE Local Security Checks
medium
71220Debian DSA-2809-1 : ruby1.8 - several vulnerabilitiesNessusDebian Local Security Checks
medium
69753Amazon Linux AMI : ruby19 (ALAS-2013-195)NessusAmazon Linux Local Security Checks
medium
69732Amazon Linux AMI : ruby (ALAS-2013-173)NessusAmazon Linux Local Security Checks
medium
69398Debian DSA-2738-1 : ruby1.9.1 - several vulnerabilitiesNessusDebian Local Security Checks
medium
68782Oracle Linux 6 : ruby (ELSA-2013-0612)NessusOracle Linux Local Security Checks
medium
68781Oracle Linux 5 : ruby (ELSA-2013-0611)NessusOracle Linux Local Security Checks
medium
66136Mandriva Linux Security Advisory : ruby (MDVSA-2013:124)NessusMandriva Local Security Checks
medium
65799SuSE 10 Security Update : ruby (ZYPP Patch Number 8524)NessusSuSE Local Security Checks
medium
65686Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : ruby1.8, ruby1.9.1 vulnerability (USN-1780-1)NessusUbuntu Local Security Checks
medium
65583Slackware 13.1 / 13.37 / 14.0 / current : ruby (SSA:2013-075-01)NessusSlackware Local Security Checks
high
65166CentOS 6 : ruby (CESA-2013:0612)NessusCentOS Local Security Checks
medium
65094Scientific Linux Security Update : ruby on SL6.x i386/x86_64 (20130307)NessusScientific Linux Local Security Checks
medium
65093Scientific Linux Security Update : ruby on SL5.x i386/x86_64 (20130307)NessusScientific Linux Local Security Checks
medium
65085RHEL 6 : ruby (RHSA-2013:0612)NessusRed Hat Local Security Checks
medium
65084RHEL 5 : ruby (RHSA-2013:0611)NessusRed Hat Local Security Checks
medium
65080CentOS 5 : ruby (CESA-2013:0611)NessusCentOS Local Security Checks
medium