ID CVE-2008-3443
Summary The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
References
Vulnerable Configurations
  • cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
    cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 03-10-2018 - 21:55)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2013-04-29T04:20:20.886-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
family unix
id oval:org.mitre.oval:def:9570
status accepted
submitted 2010-07-09T03:56:16-04:00
title The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
version 30
redhat via4
advisories
  • rhsa
    id RHSA-2008:0895
  • rhsa
    id RHSA-2008:0897
rpms
  • irb-0:1.6.4-7.el2
  • ruby-0:1.6.4-7.el2
  • ruby-devel-0:1.6.4-7.el2
  • ruby-docs-0:1.6.4-7.el2
  • ruby-libs-0:1.6.4-7.el2
  • ruby-tcltk-0:1.6.4-7.el2
  • irb-0:1.6.8-13.el3
  • ruby-0:1.6.8-13.el3
  • ruby-debuginfo-0:1.6.8-13.el3
  • ruby-devel-0:1.6.8-13.el3
  • ruby-docs-0:1.6.8-13.el3
  • ruby-libs-0:1.6.8-13.el3
  • ruby-mode-0:1.6.8-13.el3
  • ruby-tcltk-0:1.6.8-13.el3
  • irb-0:1.8.1-7.el4_7.1
  • ruby-0:1.8.1-7.el4_7.1
  • ruby-0:1.8.5-5.el5_2.5
  • ruby-debuginfo-0:1.8.1-7.el4_7.1
  • ruby-debuginfo-0:1.8.5-5.el5_2.5
  • ruby-devel-0:1.8.1-7.el4_7.1
  • ruby-devel-0:1.8.5-5.el5_2.5
  • ruby-docs-0:1.8.1-7.el4_7.1
  • ruby-docs-0:1.8.5-5.el5_2.5
  • ruby-irb-0:1.8.5-5.el5_2.5
  • ruby-libs-0:1.8.1-7.el4_7.1
  • ruby-libs-0:1.8.5-5.el5_2.5
  • ruby-mode-0:1.8.1-7.el4_7.1
  • ruby-mode-0:1.8.5-5.el5_2.5
  • ruby-rdoc-0:1.8.5-5.el5_2.5
  • ruby-ri-0:1.8.5-5.el5_2.5
  • ruby-tcltk-0:1.8.1-7.el4_7.1
  • ruby-tcltk-0:1.8.5-5.el5_2.5
refmap via4
apple APPLE-SA-2009-05-12
bid 30682
cert TA09-133A
confirm
debian DSA-1695
exploit-db 6239
fedora
  • FEDORA-2008-8736
  • FEDORA-2008-8738
sectrack 1021075
secunia
  • 31430
  • 32165
  • 32219
  • 32371
  • 32372
  • 33185
  • 33398
  • 35074
sreason 4158
ubuntu
  • USN-651-1
  • USN-691-1
vupen ADV-2009-1297
xf ruby-regex-dos(44688)
Last major update 03-10-2018 - 21:55
Published 14-08-2008 - 23:41
Last modified 03-10-2018 - 21:55
Back to Top