Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-4492

Опубликовано: 13 янв. 2010
Источник: debian
EPSS Средний

Описание

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby1.8fixed1.8.7.249-1package
ruby1.9removedpackage
ruby1.9.1fixed1.9.1.378-1package

Примечания

  • The actual issue is within the broken terminal emulators and needs to be fixed there, see CVE-2009-4487

  • same as CVE-2009-4487

EPSS

Процентиль: 95%
0.18944
Средний

Связанные уязвимости

ubuntu
больше 15 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

redhat
больше 15 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

nvd
больше 15 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

github
больше 7 лет назад

WEBrick Improper Input Validation vulnerability

oracle-oval
почти 14 лет назад

ELSA-2011-0909: ruby security update (MODERATE)

EPSS

Процентиль: 95%
0.18944
Средний