CVE Vulnerabilities

CVE-2005-2337

Published: Oct 07, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).

Affected Software

NameVendorStart VersionEnd Version
RubyYukihiro_matsumoto1.6 (including)1.6 (including)
RubyYukihiro_matsumoto1.6.1 (including)1.6.1 (including)
RubyYukihiro_matsumoto1.6.2 (including)1.6.2 (including)
RubyYukihiro_matsumoto1.6.3 (including)1.6.3 (including)
RubyYukihiro_matsumoto1.6.4 (including)1.6.4 (including)
RubyYukihiro_matsumoto1.6.5 (including)1.6.5 (including)
RubyYukihiro_matsumoto1.6.6 (including)1.6.6 (including)
RubyYukihiro_matsumoto1.6.7 (including)1.6.7 (including)
RubyYukihiro_matsumoto1.8 (including)1.8 (including)
RubyYukihiro_matsumoto1.8.1 (including)1.8.1 (including)
RubyYukihiro_matsumoto1.8.2_pre1 (including)1.8.2_pre1 (including)
RubyYukihiro_matsumoto1.8.2_pre2 (including)1.8.2_pre2 (including)
Red Hat Enterprise Linux 3RedHatruby-0:1.6.8-9.EL3.4*
Red Hat Enterprise Linux 4RedHatruby-0:1.8.1-7.EL4.2*
Ruby1.8Ubuntudevel*
Ruby1.9Ubuntudapper*
Ruby1.9Ubuntudevel*
Ruby1.9Ubuntuedgy*
Ruby1.9Ubuntufeisty*

References