FreeBSD : ruby -- Object taint bypassing in DL and Fiddle in Ruby (79789daa-8af8-4e21-a47f-e8a645752bdb)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Ruby Developers report :

There is a vulnerability in DL and Fiddle in Ruby where tainted
strings can be used by system calls regardless of the $SAFE level set
in Ruby.

Native functions exposed to Ruby with DL or Fiddle do not check the
taint values set on the objects passed in. This can result in tainted
objects being accepted as input when a SecurityError exception should
be raised.

See also :

http://www.nessus.org/u?c68fc2ca
http://www.nessus.org/u?8a4483b3

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 66632 ()

Bugtraq ID:

CVE ID: CVE-2013-2065

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now