Fedora 12 : ruby-1.8.6.383-6.fc12 (2010-0530)

Medium Nessus Plugin ID 47189

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 4.5

Synopsis

The remote Fedora host is missing a security update.

Description

A security vulnerability is found on WEBrick module in Ruby currently shipped on Fedora 12 that WEBrick lets attackers to inject malicious escape sequences to its logs, making it possible for dangerous control characters to be executed on a victim's terminal emulator. This issue has now been tagged as CVE-2009-4492. Also currently have_library() function in mkmf.rb always requires ruby's static archive to function correctly despite that ruby shared library is also provided. This new rpm will fix these issues.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected ruby package.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=554485

http://www.nessus.org/u?e21990e4

Plugin Details

Severity: Medium

ID: 47189

File Name: fedora_2010-0530.nasl

Version: 1.13

Type: local

Agent: unix

Published: 2010/07/01

Updated: 2020/08/25

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 4.5

CVSS Score Source: CVE-2009-4492

CVSS v2.0

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:ruby, cpe:/o:fedoraproject:fedora:12

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/01/14

Reference Information

CVE: CVE-2009-4492

BID: 37710

FEDORA: 2010-0530

CWE: 20