7.5
CVSSv2

CVE-2005-2337

Published: 07/10/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows malicious users to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).

Vulnerable Product Search on Vulmon Subscribe to Product

yukihiro matsumoto ruby 1.6.1

yukihiro matsumoto ruby 1.6.2

yukihiro matsumoto ruby 1.8.1

yukihiro matsumoto ruby 1.8.2_pre1

yukihiro matsumoto ruby 1.6.3

yukihiro matsumoto ruby 1.6.4

yukihiro matsumoto ruby 1.8.2_pre2

yukihiro matsumoto ruby 1.6

yukihiro matsumoto ruby 1.6.7

yukihiro matsumoto ruby 1.8

yukihiro matsumoto ruby 1.6.5

yukihiro matsumoto ruby 1.6.6

Vendor Advisories

Synopsis ruby security update Type/Severity Security Advisory: Moderate Topic Updated ruby packages that fix an arbitrary command execution issue are nowavailableThis update has been rated as having moderate security impact by the RedHat Security Response Team[Updated 25 Oct 2005]Errata has been updated t ...
Ulf Harnhammar discovered a format string vulnerability in the CDDB module’s cache file handling in the Xine library, which is used by packages such as xine-ui, totem-xine, and gxine ...
The object oriented scripting language Ruby supports safely executing untrusted code with two mechanisms: safe level and taint flag on objects Dr Yutaka Oiwa discovered a vulnerability that allows Ruby methods to bypass these mechanisms In systems which use this feature, this could be exploited to execute Ruby code beyond the restrictions specif ...
Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed The following matrix lists the fixed versions in our distributions:   old stable (woody) stable (sarge) unstable (sid) ...
Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed The following matrix lists the fixed versions in our distributions:   old stable (woody) stable (sarge) unstable (sid) ...