Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2013.0082 Multiple vulnerabilities have been identified in Ruby. 28 June 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Ruby Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Access Privileged Data -- Remote/Unauthenticated Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-4073 CVE-2013-1821 Member content until: Sunday, July 28 2013 OVERVIEW Vulnerabilities have been identified in Ruby versions prior to 2.0.0-p247, 1.9.3-p448, Ruby 1.8.7-p374. [1, 2, 3] IMPACT The following information concerning these vulnerabilities is from the vendor's website: "A vulnerability in Ruby's SSL client that could allow man-in-the-middle attackers to spoof SSL servers via valid certificate issued by a trusted certification authority. This vulnerability has been assigned the CVE identifier CVE-2013-4073." [4] "Unrestricted entity expansion can lead to a DoS vulnerability in REXML. This vulnerability has been assigned the CVE identifier CVE-2013-1821." [5] MITIGATION All users should upgrade to the latest versions. [1, 2, 3] REFERENCES [1] Ruby 2.0.0-p247 is released http://www.ruby-lang.org/en/news/2013/06/27/ruby-2-0-0-p247-is-released/ [2] Ruby 1.9.3-p448 is released http://www.ruby-lang.org/en/news/2013/06/27/ruby-1-9-3-p448-is-released/ [3] Ruby 1.8.7-p374 is released http://www.ruby-lang.org/en/news/2013/06/27/ruby-1-8-7-p374-is-released/ [4] Hostname check bypassing vulnerability in SSL client (CVE-2013-4073) http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ [5] Entity expansion DoS vulnerability in REXML (XML bomb, CVE-2013-1821) http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUcz1ZxLndAQH1ShLAQKQ6w/8CBojAR/iEzvfPSL1wfafCuqEL2jbszkl 6xd3sAbW4srJBqxCouRGswAZVK6JfjgWUV6WYaj2FW4PvhLvxPPYLA7Xf9o0HBWC VIALZamV8TO0qd1nGrKK1oQAJ5i4kSIbl1uYXvJFHV6KasI4iEuNo2pYrPnDJzmZ nr2/7fI3D+gaG+ibIHyj/MZvPA4S0BnZgL2CNOQQfR+DBHWpz+vOKDVnFxaDtMRw taU5EaWnLOnRZ4lAvJlpgR5GGAKWFcOSowvb1fomFz+pUTmdVxnYuWfOHu49/4uQ yhLihd4sybdQ+q92brUV1YDpi5fOeuIlpsTw32TlgEKYY4XVRvIy8tVlooWQ13Hv 9L6kBHDlEhJ5t0ZYOO+U2o8l2iTPk1HiyQEYTbNY4ifBr9SGKJO2NToBhC1fsHJb NzRWr7QhIH0xpSVMwn2jrkeyDcoKbP4A9THcrBS4PEdWm+mVYW+EiEvzR2dWO40E ZU1gb1WyCc6I3UDVQ2/cY8dP13nxCeSMpdqwmVjrHlsDeXqyvBGuEeP4+91DFH2C aQE/MgD0GJMmx0Td2sPBK400SOdNsUooeEziGn8YrtGPMcnnlW1SVp2rbwI0dhxY XGm5hLsZeFluGt8dkL9XNzxMyYhdvXZ8ekbg5+da9cVInipKUtPaOqJ8S/5xfkzl g0Ee3Zo5qRc= =4VZ7 -----END PGP SIGNATURE-----