FreeBSD : ruby-gems -- Algorithmic Complexity Vulnerability (742eb9e4-e3cb-4f5a-b94e-0e9a39420600)

Medium Nessus Plugin ID 71071


The remote FreeBSD host is missing one or more security-related updates.


Ruby Gem developers report :

The patch for CVE-2013-4363 was insufficiently verified so the combined regular expression for verifying gem version remains vulnerable following CVE-2013-4363.

RubyGems validates versions with a regular expression that is vulnerable to denial of service due to backtracking. For specially crafted RubyGems versions attackers can cause denial of service through CPU consumption.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 71071

File Name: freebsd_pkg_742eb9e4e3cb4f5ab94e0e9a39420600.nasl

Version: 1.2

Type: local

Published: 2013/11/25

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ruby19-gems, p-cpe:/a:freebsd:freebsd:ruby20-gems, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/11/24

Vulnerability Publication Date: 2013/09/24

Reference Information

CVE: CVE-2013-4363