CVE-2017-0902

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.

References

http://blog.rubygems.org/2017/08/27/2.6.13-released.html

http://www.securityfocus.com/bid/100586

http://www.securitytracker.com/id/1039249

https://access.redhat.com/errata/RHSA-2017:3485

https://access.redhat.com/errata/RHSA-2018:0378

https://access.redhat.com/errata/RHSA-2018:0583

https://access.redhat.com/errata/RHSA-2018:0585

https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32

https://hackerone.com/reports/218088

https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html

https://security.gentoo.org/glsa/201710-01

https://usn.ubuntu.com/3553-1/

https://usn.ubuntu.com/3685-1/

https://www.debian.org/security/2017/dsa-3966

Details

Source: MITRE

Published: 2017-08-31

Updated: 2019-10-09

Type: CWE-346

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.2

Severity: HIGH

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
137599SUSE SLES12 Security Update : ruby2.1 (SUSE-SU-2020:1570-1)NessusSuSE Local Security Checks
high
127164NewStart CGSL MAIN 5.04 : ruby Multiple Vulnerabilities (NS-SA-2019-0013)NessusNewStart CGSL Local Security Checks
high
124910EulerOS Virtualization for ARM 64 3.0.1.0 : ruby (EulerOS-SA-2019-1407)NessusHuawei Local Security Checks
high
117557EulerOS Virtualization 2.5.0 : ruby (EulerOS-SA-2018-1248)NessusHuawei Local Security Checks
high
111081Debian DLA-1421-1 : ruby2.1 security updateNessusDebian Local Security Checks
critical
110551Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : Ruby vulnerabilities (USN-3685-1)NessusUbuntu Local Security Checks
critical
108471EulerOS 2.0 SP2 : ruby (EulerOS-SA-2018-1067)NessusHuawei Local Security Checks
high
108470EulerOS 2.0 SP1 : ruby (EulerOS-SA-2018-1066)NessusHuawei Local Security Checks
high
107270CentOS 7 : ruby (CESA-2018:0378)NessusCentOS Local Security Checks
critical
107084Scientific Linux Security Update : ruby on SL7.x x86_64 (20180228)NessusScientific Linux Local Security Checks
critical
107082RHEL 7 : ruby (RHSA-2018:0378)NessusRed Hat Local Security Checks
critical
107080Oracle Linux 7 : ruby (ELSA-2018-0378)NessusOracle Linux Local Security Checks
critical
106557Ubuntu 16.04 LTS / 17.10 : ruby2.3 vulnerabilities (USN-3553-1)NessusUbuntu Local Security Checks
critical
105917Fedora 27 : rubygems (2017-81cf93b7c2)NessusFedora Local Security Checks
critical
104181Amazon Linux AMI : ruby24 (ALAS-2017-915)NessusAmazon Linux Local Security Checks
critical
103719GLSA-201710-01 : RubyGems: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
103603Amazon Linux AMI : ruby22 / ruby23 (ALAS-2017-906)NessusAmazon Linux Local Security Checks
critical
103341Fedora 25 : ruby (2017-e136d63c99)NessusFedora Local Security Checks
critical
103308Slackware 14.2 / current : ruby (SSA:2017-261-03)NessusSlackware Local Security Checks
critical
103099Fedora 26 : rubygems (2017-20214ad330)NessusFedora Local Security Checks
critical
102964Debian DSA-3966-1 : ruby2.3 - security updateNessusDebian Local Security Checks
critical