This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote EulerOS host is missing multiple security updates.
According to the versions of the ruby packages installed, the EulerOS
installation on the remote host is affected by the following
- An exploitable heap overflow vulnerability exists in
the Fiddle::Function.new 'initialize' function
functionality of Ruby. In Fiddle::Function.new
'initialize' heap buffer 'arg_types' allocation is made
based on args array length. Specially constructed
object passed as element of args array can increase
this array size after mentioned allocation and cause
- Type confusion exists in _cancel_eval Ruby's TclTkIp
class method. Attacker passing different type of object
than String as 'retval' argument can cause arbitrary
- RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and
2.4.x before 2.4.7 does not validate the hostname when
fetching gems or making API requests, which allows
remote attackers to redirect requests to arbitrary
domains via a crafted DNS SRV record, aka a 'DNS hijack
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected ruby packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.8
Public Exploit Available : true