SuSE9 Security Update : ruby (YOU Patch Number 12452)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 9 host is missing a security-related patch.

Description :

This update for ruby fixes the following security issues :

- Improve return value checks for OpenSSL function
OCSP_basic_verify() to refuse usage of revoked
certificates. (CVE-2009-0642)

- Increase entropy of DNS identifiers to avoid spoofing
attacks. (CVE-2008-3905)

- Fix denial of service (DoS) vulnerability while parsing
XML data. (CVE-2008-3790)

- Fix possible attack on algorithm complexity in function
WEBrick::HTTP::DefaultFileHandler() while parsing HTTP
requests or by using the regex engine to cause high CPU
load. (CVE-2008-3656, CVE-2008-3443)

- Improve ruby's access restriction code. (CVE-2008-3655)

- Improve safe-level handling using function DL.dlopen().

- Improve big decimal handling. (CVE-2009-1904)

- Disable bypassing of HTTP basic authentication

See also :

Solution :

Apply YOU patch number 12452.

Risk factor :

High / CVSS Base Score : 7.8

Family: SuSE Local Security Checks

Nessus Plugin ID: 41312 ()

Bugtraq ID:

CVE ID: CVE-2008-3443

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now