7.5
CVSSv2

CVE-2005-1992

Published: 20/06/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote malicious users to execute arbitrary commands.

Vulnerable Product Search on Vulmon Subscribe to Product

yukihiro matsumoto ruby 1.8

Vendor Advisories

Synopsis ruby security update Type/Severity Security Advisory: Moderate Topic Updated ruby packages that fix an arbitrary command execution issue are nowavailableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description Ruby is an inter ...
Nobuhiro IMAI discovered that the changed default value of the Module#public_instance_methods() method broke the security protection of XMLRPC server handlers A remote attacker could exploit this to execute arbitrary commands on an XMLRPC server ...
A vulnerability has been discovered in ruby18 that could allow arbitrary command execution on a server running the ruby xmlrpc server The old stable distribution (woody) did not include ruby18 This problem is fixed for the current stable distribution (sarge) in version 182-7sarge1 This problem is fixed for the unstable distribution in versi ...