ID CVE-2005-1992
Summary The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands.
References
Vulnerable Configurations
  • cpe:2.3:a:yukihiro_matsumoto:ruby:1.8
    cpe:2.3:a:yukihiro_matsumoto:ruby:1.8
CVSS
Base: 7.5 (as of 21-06-2005 - 15:08)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-543.NASL
    description Updated ruby packages that fix an arbitrary command execution issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for object-oriented programming. A bug was found in the way Ruby launched an XMLRPC server. If an XMLRPC server is launched in a certain way, it becomes possible for a remote attacker to execute arbitrary commands within the XMLRPC server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-1992 to this issue. Users of Ruby should update to these erratum packages, which contain a backported patch and are not vulnerable to this issue.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 19390
    published 2005-08-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19390
    title RHEL 4 : ruby (RHSA-2005:543)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-146-1.NASL
    description Nobuhiro IMAI discovered that the changed default value of the Module#public_instance_methods() method broke the security protection of XMLRPC server handlers. A remote attacker could exploit this to execute arbitrary commands on an XMLRPC server. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 20540
    published 2006-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20540
    title Ubuntu 4.10 / 5.04 : ruby1.8 vulnerability (USN-146-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200507-10.NASL
    description The remote host is affected by the vulnerability described in GLSA-200507-10 (Ruby: Arbitrary command execution through XML-RPC) Nobuhiro IMAI reported that an invalid default value in 'utils.rb' causes the security protections of the XML-RPC server to fail. Impact : A remote attacker could exploit this vulnerability to execute arbitrary commands. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 18669
    published 2005-07-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18669
    title GLSA-200507-10 : Ruby: Arbitrary command execution through XML-RPC
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-773.NASL
    description This advisory adds security support for the stable amd64 distribution. It covers all security updates since the release of sarge, which were missing updated packages for the not yet official amd64 port. Future security advisories will include updates for this port as well.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 57528
    published 2012-01-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57528
    title Debian DSA-773-1 : amd64 - several vulnerabilities
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2005-543.NASL
    description Updated ruby packages that fix an arbitrary command execution issue are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for object-oriented programming. A bug was found in the way Ruby launched an XMLRPC server. If an XMLRPC server is launched in a certain way, it becomes possible for a remote attacker to execute arbitrary commands within the XMLRPC server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-1992 to this issue. Users of Ruby should update to these erratum packages, which contain a backported patch and are not vulnerable to this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 21945
    published 2006-07-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21945
    title CentOS 4 : ruby (CESA-2005:543)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_594EB447E39811D9A8BD000CF18BBE54.NASL
    description Nobuhiro IMAI reports : the default value modification on Module#public_instance_methods (from false to true) breaks s.add_handler(XMLRPC::iPIMethods('sample'), MyHandler.new) style security protection. This problem could allow a remote attacker to execute arbitrary commands on XMLRPC server of libruby.
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 18942
    published 2005-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18942
    title FreeBSD : ruby -- arbitrary command execution on XMLRPC server (594eb447-e398-11d9-a8bd-000cf18bbe54)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-118.NASL
    description A vulnerability was discovered in ruby version 1.8 that could allow for the execution of arbitrary commands on a server running the ruby xmlrpc server. The updated packages have been patched to address this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 19192
    published 2005-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19192
    title Mandrake Linux Security Advisory : ruby (MDKSA-2005:118)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-748.NASL
    description A vulnerability has been discovered in ruby1.8 that could allow arbitrary command execution on a server running the ruby xmlrpc server. The old stable distribution (woody) did not include ruby1.8. This problem is fixed for the current stable distribution (sarge) in version 1.8.2-7sarge1. This problem is fixed for the unstable distribution in version 1.8.2-8.
    last seen 2019-02-21
    modified 2018-07-20
    plugin id 18663
    published 2005-07-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18663
    title Debian DSA-748-1 : ruby1.8 - bad default value
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2005-008.NASL
    description The remote host is running Apple Mac OS X, but lacks Security Update 2005-008. This security update contains fixes for the following applications : - ImageIO - LibSystem - Mail - QuickDraw - Ruby - SecurityAgent - securityd
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 19773
    published 2005-09-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19773
    title Mac OS X Multiple Vulnerabilities (Security Update 2005-008)
oval via4
accepted 2013-04-29T04:09:03.665-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands.
family unix
id oval:org.mitre.oval:def:10819
status accepted
submitted 2010-07-09T03:56:16-04:00
title The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands.
version 23
redhat via4
advisories
rhsa
id RHSA-2005:543
refmap via4
apple APPLE-SA-2005-09-22
auscert ESB-2005.0732
bid 14016
cert-vn VU#684913
ciac P-312
confirm
debian DSA-748
secunia 16920
suse SUSE-SR:2005:018
Last major update 21-08-2013 - 00:42
Published 20-06-2005 - 00:00
Last modified 10-10-2017 - 21:30
Back to Top