blob: 04fc6dafac2bb5b554552c5e0366414ba09f40ba [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200612-21">
<title>Ruby: Denial of Service vulnerability</title>
The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack.
<product type="ebuild">ruby</product>
<announced>December 20, 2006</announced>
<revised>December 20, 2006: 01</revised>
<package name="dev-lang/ruby" auto="yes" arch="*">
<unaffected range="ge">1.8.5_p2</unaffected>
<vulnerable range="lt">1.8.5_p2</vulnerable>
Ruby is a dynamic, open source programming language with a focus on
simplicity and productivity.
The read_multipart function of the CGI library shipped with Ruby
(cgi.rb) does not properly check boundaries in MIME multipart content.
This is a different issue than GLSA 200611-12.
<impact type="normal">
The vulnerability can be exploited by sending the cgi.rb library a
crafted HTTP request with multipart MIME encoding that contains a
malformed MIME boundary specifier. Successful exploitation of the
vulnerability causes the library to go into an infinite loop.
There is no known workaround at this time.
All Ruby users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.5_p2&quot;</code>
<uri link="">CVE-2006-6303</uri>
<metadata tag="submitter" timestamp="Tue, 19 Dec 2006 16:20:14 +0000">
<metadata tag="bugReady" timestamp="Tue, 19 Dec 2006 16:20:29 +0000">