FreeBSD : rubygem-rails -- multiple vulnerabilities (db0c4b00-a24c-11e2-9601-000d601460a4)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Ruby on Rails team reports :

Rails versions 3.2.13 has been released. This release contains
important security fixes. It is recommended users upgrade as soon as
possible.

Four vulnerabilities have been discovered and fixed :

- (CVE-2013-1854) Symbol DoS vulnerability in Active Record

- (CVE-2013-1855) XSS vulnerability in sanitize_css in Action Pack

- (CVE-2013-1856) XML Parsing Vulnerability affecting JRuby users

- (CVE-2013-1857) XSS Vulnerability in the `sanitize` helper of Ruby
on Rails

See also :

http://www.nessus.org/u?cb881602
https://groups.google.com/forum/#!topic/ruby-security-ann/o0Dsdk2WrQ0
http://www.nessus.org/u?2464e744
http://www.nessus.org/u?865e8938
http://www.nessus.org/u?7661b1e6
http://www.nessus.org/u?afbfddaa

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 65937 ()

Bugtraq ID:

CVE ID: CVE-2013-1854
CVE-2013-1856
CVE-2013-1857

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now