ID CVE-2008-4310
Summary httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.
References
Vulnerable Configurations
  • Ruby-lang Ruby 1.8.1
    cpe:2.3:a:ruby-lang:ruby:1.8.1
  • Ruby-lang Ruby 1.8.5
    cpe:2.3:a:ruby-lang:ruby:1.8.5
CVSS
Base: 7.8 (as of 09-12-2008 - 10:58)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
exploit-db via4
description Ruby 1.9 WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request DoS. CVE-2008-3656,CVE-2008-4310. Dos exploits for multiple platform
id EDB-ID:32222
last seen 2016-02-03
modified 2008-08-11
published 2008-08-11
reporter Keita Yamaguchi
source https://www.exploit-db.com/download/32222/
title Ruby <= 1.9 WEBrick::HTTP::DefaultFileHandler Crafted HTTP Request DoS
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2008-0981.NASL
    description Updated ruby packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310) All Ruby users should upgrade to these updated packages, which contain a correct patch that resolves this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 35263
    published 2008-12-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35263
    title CentOS 4 / 5 : ruby (CESA-2008:0981)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2008-0981.NASL
    description Updated ruby packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310) All Ruby users should upgrade to these updated packages, which contain a correct patch that resolves this issue.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 35038
    published 2008-12-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35038
    title RHEL 4 / 5 : ruby (RHSA-2008:0981)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20081204_RUBY_ON_SL4_X.NASL
    description Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310)
    last seen 2019-02-21
    modified 2019-01-07
    plugin id 60502
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60502
    title Scientific Linux Security Update : ruby on SL4.x, SL5.x i386/x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2008-0981.NASL
    description From Red Hat Security Advisory 2008:0981 : Updated ruby packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310) All Ruby users should upgrade to these updated packages, which contain a correct patch that resolves this issue.
    last seen 2019-02-21
    modified 2015-12-01
    plugin id 67767
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67767
    title Oracle Linux 4 / 5 : ruby (ELSA-2008-0981)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2008-0897.NASL
    description Updated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs and a fixed source port when sending DNS requests. A remote attacker could use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905) Ruby's XML document parsing module (REXML) was prone to a denial of service attack via XML documents with large XML entity definitions recursion. A specially crafted XML file could cause a Ruby application using the REXML module to use an excessive amount of CPU and memory. (CVE-2008-3790) An insufficient 'taintness' check flaw was discovered in Ruby's DL module, which provides direct access to the C language functions. An attacker could use this flaw to bypass intended safe-level restrictions by calling external C functions with the arguments from an untrusted tainted inputs. (CVE-2008-3657) A denial of service flaw was discovered in WEBrick, Ruby's HTTP server toolkit. A remote attacker could send a specially crafted HTTP request to a WEBrick server that would cause the server to use an excessive amount of CPU time. (CVE-2008-3656) A number of flaws were found in the safe-level restrictions in Ruby. It was possible for an attacker to create a carefully crafted malicious script that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655) A denial of service flaw was found in Ruby's regular expression engine. If a Ruby script tried to process a large amount of data via a regular expression, it could cause Ruby to enter an infinite-loop and crash. (CVE-2008-3443) Users of ruby should upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 34502
    published 2008-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34502
    title CentOS 4 / 5 : ruby (CESA-2008:0897)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2008-0897.NASL
    description From Red Hat Security Advisory 2008:0897 : Updated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs and a fixed source port when sending DNS requests. A remote attacker could use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905) Ruby's XML document parsing module (REXML) was prone to a denial of service attack via XML documents with large XML entity definitions recursion. A specially crafted XML file could cause a Ruby application using the REXML module to use an excessive amount of CPU and memory. (CVE-2008-3790) An insufficient 'taintness' check flaw was discovered in Ruby's DL module, which provides direct access to the C language functions. An attacker could use this flaw to bypass intended safe-level restrictions by calling external C functions with the arguments from an untrusted tainted inputs. (CVE-2008-3657) A denial of service flaw was discovered in WEBrick, Ruby's HTTP server toolkit. A remote attacker could send a specially crafted HTTP request to a WEBrick server that would cause the server to use an excessive amount of CPU time. (CVE-2008-3656) A number of flaws were found in the safe-level restrictions in Ruby. It was possible for an attacker to create a carefully crafted malicious script that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655) A denial of service flaw was found in Ruby's regular expression engine. If a Ruby script tried to process a large amount of data via a regular expression, it could cause Ruby to enter an infinite-loop and crash. (CVE-2008-3443) Users of ruby should upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2016-12-07
    plugin id 67752
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67752
    title Oracle Linux 4 / 5 : ruby (ELSA-2008-0897)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2008-0897.NASL
    description Updated ruby packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Ruby is an interpreted scripting language for quick and easy object-oriented programming. The Ruby DNS resolver library, resolv.rb, used predictable transaction IDs and a fixed source port when sending DNS requests. A remote attacker could use this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905) Ruby's XML document parsing module (REXML) was prone to a denial of service attack via XML documents with large XML entity definitions recursion. A specially crafted XML file could cause a Ruby application using the REXML module to use an excessive amount of CPU and memory. (CVE-2008-3790) An insufficient 'taintness' check flaw was discovered in Ruby's DL module, which provides direct access to the C language functions. An attacker could use this flaw to bypass intended safe-level restrictions by calling external C functions with the arguments from an untrusted tainted inputs. (CVE-2008-3657) A denial of service flaw was discovered in WEBrick, Ruby's HTTP server toolkit. A remote attacker could send a specially crafted HTTP request to a WEBrick server that would cause the server to use an excessive amount of CPU time. (CVE-2008-3656) A number of flaws were found in the safe-level restrictions in Ruby. It was possible for an attacker to create a carefully crafted malicious script that can allow the bypass of certain safe-level restrictions. (CVE-2008-3655) A denial of service flaw was found in Ruby's regular expression engine. If a Ruby script tried to process a large amount of data via a regular expression, it could cause Ruby to enter an infinite-loop and crash. (CVE-2008-3443) Users of ruby should upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 34466
    published 2008-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34466
    title RHEL 4 / 5 : ruby (RHSA-2008:0897)
oval via4
accepted 2013-04-29T04:04:01.547-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.
family unix
id oval:org.mitre.oval:def:10250
status accepted
submitted 2010-07-09T03:56:16-04:00
title httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat Enterprise Linux 4 and 5, allows remote attackers to cause a denial of service (CPU consumption) via a crafted HTTP request. NOTE: this issue exists because of an incomplete fix for CVE-2008-3656.
version 24
redhat via4
advisories
bugzilla
id 470252
title CVE-2008-4310 ruby: Incomplete fix for CVE-2008-3656
oval
OR
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304001
    • OR
      • AND
        • comment irb is earlier than 0:1.8.1-7.el4_7.2
          oval oval:com.redhat.rhsa:tst:20080981010
        • comment irb is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060729015
      • AND
        • comment ruby is earlier than 0:1.8.1-7.el4_7.2
          oval oval:com.redhat.rhsa:tst:20080981002
        • comment ruby is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060729003
      • AND
        • comment ruby-devel is earlier than 0:1.8.1-7.el4_7.2
          oval oval:com.redhat.rhsa:tst:20080981008
        • comment ruby-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060729011
      • AND
        • comment ruby-docs is earlier than 0:1.8.1-7.el4_7.2
          oval oval:com.redhat.rhsa:tst:20080981014
        • comment ruby-docs is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060729007
      • AND
        • comment ruby-libs is earlier than 0:1.8.1-7.el4_7.2
          oval oval:com.redhat.rhsa:tst:20080981004
        • comment ruby-libs is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060729009
      • AND
        • comment ruby-mode is earlier than 0:1.8.1-7.el4_7.2
          oval oval:com.redhat.rhsa:tst:20080981006
        • comment ruby-mode is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060729005
      • AND
        • comment ruby-tcltk is earlier than 0:1.8.1-7.el4_7.2
          oval oval:com.redhat.rhsa:tst:20080981012
        • comment ruby-tcltk is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060729013
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment ruby is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981017
        • comment ruby is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965003
      • AND
        • comment ruby-devel is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981027
        • comment ruby-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965013
      • AND
        • comment ruby-docs is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981023
        • comment ruby-docs is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965017
      • AND
        • comment ruby-irb is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981033
        • comment ruby-irb is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965011
      • AND
        • comment ruby-libs is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981029
        • comment ruby-libs is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965019
      • AND
        • comment ruby-mode is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981021
        • comment ruby-mode is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965005
      • AND
        • comment ruby-rdoc is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981031
        • comment ruby-rdoc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965007
      • AND
        • comment ruby-ri is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981025
        • comment ruby-ri is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965015
      • AND
        • comment ruby-tcltk is earlier than 0:1.8.5-5.el5_2.6
          oval oval:com.redhat.rhsa:tst:20080981019
        • comment ruby-tcltk is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070965009
rhsa
id RHSA-2008:0981
released 2008-12-04
severity Moderate
title RHSA-2008:0981: ruby security update (Moderate)
rpms
  • irb-0:1.8.1-7.el4_7.2
  • ruby-0:1.8.1-7.el4_7.2
  • ruby-devel-0:1.8.1-7.el4_7.2
  • ruby-docs-0:1.8.1-7.el4_7.2
  • ruby-libs-0:1.8.1-7.el4_7.2
  • ruby-mode-0:1.8.1-7.el4_7.2
  • ruby-tcltk-0:1.8.1-7.el4_7.2
  • ruby-0:1.8.5-5.el5_2.6
  • ruby-devel-0:1.8.5-5.el5_2.6
  • ruby-docs-0:1.8.5-5.el5_2.6
  • ruby-irb-0:1.8.5-5.el5_2.6
  • ruby-libs-0:1.8.5-5.el5_2.6
  • ruby-mode-0:1.8.5-5.el5_2.6
  • ruby-rdoc-0:1.8.5-5.el5_2.6
  • ruby-ri-0:1.8.5-5.el5_2.6
  • ruby-tcltk-0:1.8.5-5.el5_2.6
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=470252
mlist [oss-security] 20081204 ruby CVE-2008-4310 (Red Hat specific)
secunia 33013
Last major update 21-08-2010 - 00:00
Published 08-12-2008 - 19:30
Last modified 28-09-2017 - 21:32
Back to Top