SuSE 11 Security Update : ruby (SAT Patch Number 1073)

High Nessus Plugin ID 41452


The remote SuSE 11 host is missing one or more security updates.


This ruby update improves return value checks for openssl function OCSP_basic_verify() (CVE-2009-0642) which allowed an attacker to use revoked certificates.

The entropy of DNS identifiers was increased (CVE-2008-3905) to avaid spoofing attacks.

The code for parsing XML data was vulnerable to a denial of service bug. (CVE-2008-3790)

An attack on algorithm complexity was possible in function WEBrick::HTTP::DefaultFileHandler() while parsing HTTP requests (CVE-2008-3656) as well as by using the regex engine (CVE-2008-3443) causing high CPU load.

Ruby's access restriction code (CVE-2008-3655) as well as safe-level handling using function DL.dlopen() (CVE-2008-3657) and big decimal handling (CVE-2009-1904) was improved.

Bypassing HTTP basic authentication (authenticate_with_http_digest) is not possible anymore.


Apply SAT patch number 1073.

See Also

Plugin Details

Severity: High

ID: 41452

File Name: suse_11_ruby-090703.nasl

Version: $Revision: 1.12 $

Type: local

Agent: unix

Published: 2009/09/24

Modified: 2016/12/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:ruby, p-cpe:/a:novell:suse_linux:11:ruby-doc-html, p-cpe:/a:novell:suse_linux:11:ruby-tk, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2009/07/03

Reference Information

CVE: CVE-2008-3443, CVE-2008-3655, CVE-2008-3656, CVE-2008-3657, CVE-2008-3790, CVE-2008-3905, CVE-2009-0642, CVE-2009-1904

CWE: 20, 189, 264, 287, 399