[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] [PLSA 2008-35] Ruby: Denial of Service
- To: pardus-security@xxxxxxxxxxxxx
- Subject: [Full-disclosure] [PLSA 2008-35] Ruby: Denial of Service
- From: Pınar Yanardağ <pinar@xxxxxxxxxxxxx>
- Date: Mon, 01 Sep 2008 04:22:30 +0300
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-35 security@xxxxxxxxxxxxx
------------------------------------------------------------------------
Date: 2008-09-01
Severity: 3
Type: Remote
------------------------------------------------------------------------
Summary
=======
A vulnerability has been reported in Ruby, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Description
===========
The vulnerability is caused due to an error in the REXML library when
processing recursively nested XML entities. This can be exploited to
cause a DoS via a specially crafted XML document.
Note: This vulnerability found by Luka Treiber and Mitja Kolsek of ACROS
Security.
Affected packages:
Pardus 2008:
ruby, all before 1.8.7_p72-17-5
ruby-mode, all before 1.8.7_p72-17-5
Pardus 2007:
ruby, all before 1.8.7_p72-17-14
ruby-mode, all before 1.8.7_p72-17-5
Resolution
==========
There are update(s) for ruby, ruby-mode. You can update them via Package
Manager or with a single command from console:
Pardus 2008:
pisi up ruby ruby-mode
Pardus 2007:
pisi up ruby ruby-mode
References
==========
* http://security.pardus.org.tr/en/2008-35
* http://bugs.pardus.org.tr/show_bug.cgi?id=8044
* http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/
* http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3790
* http://secunia.com/advisories/31602
------------------------------------------------------------------------
--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/