Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-4464

Опубликовано: 25 апр. 2013
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.

РелизСтатусПримечание
devel

not-affected

hardy

ignored

end of life
lucid

not-affected

natty

not-affected

oneiric

not-affected

precise

not-affected

quantal

not-affected

upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

not-affected

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

released

1.9.3.194-1ubuntu1.1
hardy

DNE

lucid

not-affected

1.9.1.378-1
natty

not-affected

1.9.2.0-2
oneiric

not-affected

1.9.2.290-2
precise

released

1.9.3.0-1ubuntu2.3
quantal

released

1.9.3.194-1ubuntu1.1
upstream

needs-triage

Показывать по

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.

nvd
почти 13 лет назад

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.

debian
почти 13 лет назад

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows ...

github
больше 3 лет назад

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.

5 Medium

CVSS2