ruby1.8 vulnerabilities

Related Vulnerabilities: CVE-2008-2662   CVE-2008-2663   CVE-2008-2725   CVE-2008-2726   CVE-2008-2664  

Drew Yao discovered several vulnerabilities in Ruby which lead to integer overflows. If a user or automated system were tricked into running a malicious script, an attacker could cause a denial of service or execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2662, CVE-2008-2663, CVE-2008-2725, CVE-2008-2726)

Drew Yao discovered that Ruby did not sanitize its input when using ALLOCA. If a user or automated system were tricked into running a malicious script, an attacker could cause a denial of service via memory corruption. (CVE-2008-2664)

26 June 2008

ruby1.8 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 8.04 LTS
  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.06 LTS

Software Description

  • ruby1.8

Details

Drew Yao discovered several vulnerabilities in Ruby which lead to integer overflows. If a user or automated system were tricked into running a malicious script, an attacker could cause a denial of service or execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2662, CVE-2008-2663, CVE-2008-2725, CVE-2008-2726)

Drew Yao discovered that Ruby did not sanitize its input when using ALLOCA. If a user or automated system were tricked into running a malicious script, an attacker could cause a denial of service via memory corruption. (CVE-2008-2664)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 8.04 LTS
libruby1.8 - 1.8.6.111-2ubuntu1.1
ruby1.8 - 1.8.6.111-2ubuntu1.1
Ubuntu 7.10
libruby1.8 - 1.8.6.36-1ubuntu3.2
ruby1.8 - 1.8.6.36-1ubuntu3.2
Ubuntu 7.04
libruby1.8 - 1.8.5-4ubuntu2.2
ruby1.8 - 1.8.5-4ubuntu2.2
Ubuntu 6.06 LTS
libruby1.8 - 1.8.4-1ubuntu1.5
ruby1.8 - 1.8.4-1ubuntu1.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References