Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-9097

Опубликовано: 12 июн. 2017
Источник: debian
EPSS Низкий

Описание

The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-mailfixed2.6.1+dfsg1-1package

Примечания

  • https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83

  • CVE Request: https://www.openwall.com/lists/oss-security/2015/12/11/3

  • Fixed in 2.6.0

  • "Note that, this patch might not be complete ..." https://bugzilla.redhat.com/show_bug.cgi?id=1293598

EPSS

Процентиль: 77%
0.01021
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 8 лет назад

The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

redhat
около 10 лет назад

The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

CVSS3: 6.1
nvd
больше 8 лет назад

The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

CVSS3: 6.1
github
больше 8 лет назад

Mail Gem CRLF Injection vulnerability

EPSS

Процентиль: 77%
0.01021
Низкий