Fedora 18 : ruby-1.9.3.448-31.fc18 (2013-12123)

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

A vulnerability was found in Ruby's SSL client that could allow
man-in-the-middle attackers to spoof SSL servers via valid certificate
issued by a trusted certification authority.

This vulnerability has been assigned the CVE identifier CVE-2013-4073.

This new update should solve this issue.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=979295
http://www.nessus.org/u?3b8c5d83

Solution :

Update the affected ruby package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 67339 ()

Bugtraq ID: 60843

CVE ID: CVE-2013-4073

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now