Mandriva Linux Security Advisory : ruby (MDVSA-2013:124)

medium Nessus Plugin ID 66136


The remote Mandriva Linux host is missing one or more security updates.


Updated ruby packages fix security vulnerabilities :

Shugo Maedo and Vit Ondruch discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions (CVE-2012-4466, CVE-2012-4481).

It was discovered that Ruby's REXML library did not properly restrict XML entity expansion. An attacker could use this flaw to cause a denial of service by tricking a Ruby application using REXML to read text nodes from specially crafted XML content, which will result in REXML consuming large amounts of system memory (CVE-2013-1821).


Update the affected packages.

Plugin Details

Severity: Medium

ID: 66136

File Name: mandriva_MDVSA-2013-124.nasl

Version: 1.8

Type: local

Published: 4/20/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.7


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ruby, p-cpe:/a:mandriva:linux:ruby-devel, p-cpe:/a:mandriva:linux:ruby-doc, p-cpe:/a:mandriva:linux:ruby-tk, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/10/2013

Reference Information

CVE: CVE-2012-4466, CVE-2012-4481, CVE-2013-1821

BID: 55757, 55813, 58141

MDVSA: 2013:124

MGASA: 2012-0294, 2013-0092