(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-2065 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 2.6 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Software Collections 1 for Red Hat Enterprise Linux | ruby193-ruby | Will not fix |
Red Hat OpenShift Enterprise 1 | ruby193-ruby | Will not fix |
Red Hat Enterprise Linux 6 | ruby | Not affected |
Red Hat Enterprise Linux 5 | ruby | Not affected |
Red Hat Enterprise Linux 4 | ruby | Not affected |