Published:2006/07/11  Last Updated:2008/05/21

JVN#83768862
Ruby vulnerability caused by a problem with the alias funtion so that safe level 4 does not function as a sandbox

Overview

Safe levels exist as a part of the Ruby language security model, in order to limit the operation of untrusted objects. Ruby contains a vulnerability which may allow an attacker to bypass the safe level restrictions and execute normally inaccessible methods, due to a problem in Ruby's alias function.

Products Affected

  • Ruby 1.8.4-20060328 and earlier Snapshot versions
As a workaround, we recommend that users update to the latest Ruby 1.8.4 snapshot version.

Description

Impact

An attacker could force programs to crash.

Solution

Vendor Status

Vendor Link
Ruby http://www.ruby-lang.org/ja/

References

JPCERT/CC Addendum

Credit

Akira Tanaka of National Institute of Advanced Industrial Science and Technology (AIST), Japan reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2006-000858

Update History