DSA-2783-1 librack-ruby -- several vulnerabilities

Related Vulnerabilities: CVE-2011-5036   CVE-2013-0183   CVE-2013-0184   CVE-2013-0263  

Several vulnerabilities were discovered in Rack, a modular Ruby webserver interface. The Common Vulnerabilites and Exposures project identifies the following vulnerabilities: CVE-2011-5036 Rack computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. CVE-2013-0183 A remote attacker could cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet. CVE-2013-0184 A vulnerability in Rack::Auth::AbstractRequest allows remote attackers to cause a denial of service via unknown vectors. CVE-2013-0263 Rack::Session::Cookie allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time. For the oldstable distribution (squeeze), these problems have been fixed in version 1.1.0-4+squeeze1. The stable, testing and unstable distributions do not contain the librack-ruby package. They have already been addressed in version 1.4.1-2.1 of the ruby-rack package. We recommend that you upgrade your librack-ruby packages.

Debian Security Advisory

DSA-2783-1 librack-ruby -- several vulnerabilities

Date Reported:
21 Oct 2013
Affected Packages:
librack-ruby
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 653963, Bug 698440, Bug 700226.
In Mitre's CVE dictionary: CVE-2011-5036, CVE-2013-0183, CVE-2013-0184, CVE-2013-0263.
More information:

Several vulnerabilities were discovered in Rack, a modular Ruby webserver interface. The Common Vulnerabilites and Exposures project identifies the following vulnerabilities:

  • CVE-2011-5036

    Rack computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

  • CVE-2013-0183

    A remote attacker could cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.

  • CVE-2013-0184

    A vulnerability in Rack::Auth::AbstractRequest allows remote attackers to cause a denial of service via unknown vectors.

  • CVE-2013-0263

    Rack::Session::Cookie allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.

For the oldstable distribution (squeeze), these problems have been fixed in version 1.1.0-4+squeeze1.

The stable, testing and unstable distributions do not contain the librack-ruby package. They have already been addressed in version 1.4.1-2.1 of the ruby-rack package.

We recommend that you upgrade your librack-ruby packages.