Mandrake Linux Security Advisory : ruby (MDKSA-2006:079)

Medium Nessus Plugin ID 21285


The remote Mandrake Linux host is missing one or more security updates.


A vulnerability in how ruby's HTTP module uses blocking sockets was reported by Yukihiro Matsumoto. By sending large amounts of data to a server application using this module, a remote attacker could exploit it to render the application unusable and not respond to other client requests.

The updated packages have been patched to fix this problem.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 21285

File Name: mandrake_MDKSA-2006-079.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2006/04/26

Modified: 2015/03/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ruby, p-cpe:/a:mandriva:linux:ruby-devel, p-cpe:/a:mandriva:linux:ruby-doc, p-cpe:/a:mandriva:linux:ruby-tk, cpe:/o:mandriva:linux:2006, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/04/25

Reference Information

CVE: CVE-2006-1931

BID: 17645

MDKSA: 2006:079