
CVE-2011-2705 – ruby: Properly initialize the random number generator when forking new process
https://notcve.org/view.php?id=CVE-2011-2705
05 Aug 2011 — The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID. La función SecureRandom.random_bytes de lib/securerandom.rb de Ruby en versiones anteriores a 1.8.7-p352 y 1.9.x anteriores a 1.9.2-p290 se basa en valores PID para la inicializaci... • http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html • CWE-20: Improper Input Validation •

CVE-2011-2686
https://notcve.org/view.php?id=CVE-2011-2686
05 Aug 2011 — Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development. Ruby en versiones anteriores a la 1.8.7-p352 no resetea la semilla aleatoria después de la creacción de procesos ("forking"), lo que facilita a atacant... • http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html • CWE-310: Cryptographic Issues •

CVE-2011-0188 – ruby: memory corruption in BigDecimal on 64bit platforms
https://notcve.org/view.php?id=CVE-2011-0188
23 Mar 2011 — The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue." La función VpMemAlloc en bigdecimal.c en la clase BigDecimal en Ruby v1.9.2-P1... • http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html • CWE-189: Numeric Errors •

CVE-2011-1004 – Ruby: Symlink race condition by removing directory trees in fileutils module
https://notcve.org/view.php?id=CVE-2011-1004
02 Mar 2011 — The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack. El método FileUtils.remove_entry_secure de Ruby 1.8.6 hasta la versión 1.8.6-420, 1.8.7 hasta la 1.8.7-330, 1.8.8dev, 1.9.1 hasta la 1.9.1-430, 1.9.2 hasta la 1.9.2-136 y 1.9.3dev permite a usuarios locales borrar archivos de su elección a través de un enlace de ataque sim... • http://lists.apple.com/archives/security-announce/2012/May/msg00001.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2011-1005 – Ruby: Untrusted codes able to modify arbitrary strings
https://notcve.org/view.php?id=CVE-2011-1005
02 Mar 2011 — The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname. La funcionalidad safe-level de Ruby 1.8.6 hasta la versión 1.8.6-420, 1.8.7 hasta la 1.8.7-330 y 1.8.8dev permite a atacantes, dependiendo del contexto, modificar cadenas de texto a través del método Exception#to_s method, como se ha demostrado cambiando el pathname previsto. Multipl... • http://lists.apple.com/archives/security-announce/2012/May/msg00001.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-2489
https://notcve.org/view.php?id=CVE-2010-2489
09 Jul 2010 — Buffer overflow in Ruby 1.9.x before 1.9.1-p429 on Windows might allow local users to gain privileges via a crafted ARGF.inplace_mode value that is not properly handled when constructing the filenames of the backup files. Desbordamiento de búfer en Ruby v1.9.x anterior v1.9.1-p429 en Windows puede permitir a usuarios locales ganar privilegios mediante un valor ARGF.inplace_mode manipulado que no es correctamente manejado cuando construye los nombres de archivos de los ficheros backup • http://osdir.com/ml/ruby-talk/2010-07/msg00095.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2009-4492 – Ruby 1.9.1 - WEBrick 'Terminal Escape Sequence in Logs' Command Injection
https://notcve.org/view.php?id=CVE-2009-4492
13 Jan 2010 — WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. WEBrick v1.3.1 en Ruby v1.8.6 del patchlevel 383, v1.8.7 al patchlevel 248, v1.8.8dev, 1.9.1 al patchlevel 37... • https://www.exploit-db.com/exploits/33489 •

CVE-2009-4124
https://notcve.org/view.php?id=CVE-2009-4124
11 Dec 2009 — Heap-based buffer overflow in the rb_str_justify function in string.c in Ruby 1.9.1 before 1.9.1-p376 allows context-dependent attackers to execute arbitrary code via unspecified vectors involving (1) String#ljust, (2) String#center, or (3) String#rjust. NOTE: some of these details are obtained from third party information. Desbordamiento del búfer de la memoria dinámica en la función rb_str_justify en string.c en Ruby v1.9.1 en versiones anteriores a v1.9.1-p376 atacantes dependientes del contexto podrían ... • http://secunia.com/advisories/37660 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2009-1904 – ruby: DoS vulnerability in BigDecimal
https://notcve.org/view.php?id=CVE-2009-1904
11 Jun 2009 — The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type. La librería BigDecimal en Ruby v1.8.6 anteriores p369 y v1.8.7, anteriores a p173 permite a los atacantes dependientes del contexto causar una denegación de servicio (caída de la aplicación) a través de un argumento de cadena de caracte... • https://github.com/NZKoz/bigdecimal-segfault-fix • CWE-189: Numeric Errors •

CVE-2009-0642 – ruby: Incorrect checks for validity of X.509 certificates
https://notcve.org/view.php?id=CVE-2009-0642
18 Feb 2009 — ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate. ext/openssl/ossl_ocsp.c en Ruby v1.8 y v1.9 no comprueba adecuadamente el valor de retorno de la funcion OCSP_basic_verify, lo cual permitiria a atacantes remotos tener exito en la presentacion de un certificado X.509 invalido, posiblemente utilizando un cert... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528 • CWE-287: Improper Authentication •