Oracle Solaris Third-Party Patch Update : ruby (cve_2013_4073_cryptographic_issues)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- The safe-level feature in Ruby 1.8.6 through 1.8.6-420,
1.8.7 through 1.8.7-330, and 1.8.8dev allows
context-dependent attackers to modify strings via the
Exception#to_s method, as demonstrated by changing an
intended pathname. (CVE-2011-1005)

- The safe-level feature in Ruby 1.8.7 allows
context-dependent attackers to modify strings via the
NameError#to_s method when operating on Ruby objects.
NOTE: this issue is due to an incomplete fix for
CVE-2011-1005. (CVE-2012-4481)

- The OpenSSL::SSL.verify_certificate_identity function in
lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9
before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not
properly handle a '\0' character in a domain name in the
Subject Alternative Name field of an X.509 certificate,
which allows man-in-the-middle attackers to spoof
arbitrary SSL servers via a crafted certificate issued
by a legitimate Certification Authority, a related issue
to CVE-2009-2408. (CVE-2013-4073)

See also :

http://www.nessus.org/u?b5f8def1
http://www.nessus.org/u?4d657282
http://www.nessus.org/u?ca501082

Solution :

Upgrade to Solaris 11.1.11.4.0.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80755 ()

Bugtraq ID:

CVE ID: CVE-2011-1005
CVE-2012-4481
CVE-2013-4073

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now