FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

ruby -- vulnerability in the safe level settings

Affected packages
1.6.* < ruby < 1.6.8.2004.07.28_2
1.8.* < ruby < 1.8.2_5
1.6.* < ruby_static < 1.6.8.2004.07.28_2
1.8.* < ruby_static < 1.8.2_5

Details

VuXML ID 1daea60a-4719-11da-b5c6-0004614cc33d
Discovery 2005-10-02
Entry 2005-10-27

Ruby home page reports:

The Object Oriented Scripting Language Ruby supports safely executing an untrusted code with two mechanisms: safe level and taint flag on objects.

A vulnerability has been found that allows bypassing these mechanisms.

By using the vulnerability, arbitrary code can be executed beyond the restrictions specified in each safe level. Therefore, Ruby has to be updated on all systems that use safe level to execute untrusted code.

References

CVE Name CVE-2005-2337
URL http://www.ruby-lang.org/en/20051003.html