Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-4466

Опубликовано: 02 окт. 2012
Источник: redhat
CVSS2: 4.3

Описание

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5rubyNot affected
Red Hat Enterprise Linux 6rubyNot affected
RHEL 6 Version of OpenShift EnterprisegraphvizFixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-consoleFixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-origin-brokerFixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-origin-broker-utilFixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-origin-cartridge-cron-1.4FixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-origin-cartridge-diy-0.1FixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-origin-cartridge-haproxy-1.4FixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-origin-cartridge-jbosseap-6.0FixedRHSA-2013:058228.02.2013

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-266
https://bugzilla.redhat.com/show_bug.cgi?id=862614ruby: safe level bypass via name_err_mesg_to_str()

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

nvd
почти 13 лет назад

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

debian
почти 13 лет назад

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 ...

github
больше 3 лет назад

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

4.3 Medium

CVSS2