FreeBSD : ruby -- vulnerability in the safe level settings (1daea60a-4719-11da-b5c6-0004614cc33d)

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Ruby home page reports :

The Object Oriented Scripting Language Ruby supports safely executing
an untrusted code with two mechanisms : safe level and taint flag on
objects.

A vulnerability has been found that allows bypassing these mechanisms.

By using the vulnerability, arbitrary code can be executed beyond the
restrictions specified in each safe level. Therefore, Ruby has to be
updated on all systems that use safe level to execute untrusted code.

See also :

http://www.ruby-lang.org/en/20051003.html
http://www.nessus.org/u?56761b6d

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21394 (freebsd_pkg_1daea60a471911dab5c60004614cc33d.nasl)

Bugtraq ID:

CVE ID: CVE-2005-2337

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now