FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2005-2337

This CVE name corresponds to:

Entered Topic
2005-10-27 ruby -- vulnerability in the safe level settings

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2005-2337
Phase Assigned(20050721)

Description

Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).

References

Source Reference
CONFIRM http://www.ruby-lang.org/en/20051003.html
APPLE APPLE-SA-2006-05-11
DEBIAN DSA-860
DEBIAN DSA-862
DEBIAN DSA-864
GENTOO GLSA-200510-05
MANDRIVA MDKSA-2005:191
REDHAT RHSA-2005:799
SUSE SUSE-SR:2006:005
UBUNTU USN-195-1
CERT TA06-132A
CERT-VN VU#160012
MISC http://jvn.jp/jp/JVN%2362914675/index.html
BID 14909
BID 17951
OVAL oval:org.mitre.oval:def:10564
VUPEN ADV-2006-1779
SECTRACK 1014948
SECUNIA 16904
SECUNIA 17094
SECUNIA 17129
SECUNIA 17147
SECUNIA 17285
SECUNIA 19130
SECUNIA 17098
SECUNIA 20077
SREASON 59
XF ruby-eval-security-bypass(22360)