Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-2734

Опубликовано: 24 апр. 2014
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5.8

Описание

The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

quantal

ignored

saucy

ignored

trusty

DNE

trusty/esm

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

ignored

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

ignored

end of life
precise

ignored

quantal

ignored

saucy

ignored

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

needed

Показывать по

РелизСтатусПримечание
devel

ignored

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

needed

Показывать по

EPSS

Процентиль: 90%
0.05796
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 12 лет назад

The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher

nvd
почти 12 лет назад

The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher

debian
почти 12 лет назад

The openssl extension in Ruby 2.x does not properly maintain the state ...

github
больше 3 лет назад

** DISPUTED ** The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher.

EPSS

Процентиль: 90%
0.05796
Низкий

5.8 Medium

CVSS2