CVE-2013-2065

Related Vulnerabilities: CVE-2013-2065  

(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.

The MITRE CVE dictionary describes this issue as:

(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.

Find out more about CVE-2013-2065 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 2.6
Base Metrics AV:N/AC:H/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Software Collections 1 for Red Hat Enterprise Linux ruby193-ruby Will not fix
Red Hat OpenShift Enterprise 1 ruby193-ruby Will not fix
Red Hat Enterprise Linux 6 ruby Not affected
Red Hat Enterprise Linux 5 ruby Not affected
Red Hat Enterprise Linux 4 ruby Not affected

Acknowledgements

This issue was discovered by Vit Ondruch of Red Hat.

External References