openSUSE Security Update : ruby19 (openSUSE-SU-2013:1179-1)

medium Nessus Plugin ID 75079

Synopsis

The remote openSUSE host is missing a security update.

Description

was updated to fix SSL hostname certification (CVE-2013-4073) (bnc#827265).
https://github.com/ruby/ruby/commit/2669b84d407ab431e965145c827db66c91 158f89

Solution

Update the affected ruby19 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=827265

http://www.nessus.org/u?df5157c5

https://lists.opensuse.org/opensuse-updates/2013-07/msg00040.html

Plugin Details

Severity: Medium

ID: 75079

File Name: openSUSE-2013-572.nasl

Version: 1.6

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:ruby19, p-cpe:/a:novell:opensuse:ruby19-debuginfo, p-cpe:/a:novell:opensuse:ruby19-debugsource, p-cpe:/a:novell:opensuse:ruby19-devel, p-cpe:/a:novell:opensuse:ruby19-devel-extra, p-cpe:/a:novell:opensuse:ruby19-doc-ri, p-cpe:/a:novell:opensuse:ruby19-tk, p-cpe:/a:novell:opensuse:ruby19-tk-debuginfo, cpe:/o:novell:opensuse:12.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 7/3/2013

Reference Information

CVE: CVE-2013-4073