CVE Vulnerabilities

CVE-2013-1802

Published: Apr 09, 2013 | Modified: Apr 10, 2013
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Affected Software

Name Vendor Start Version End Version
Extlib Dan_kubb * 0.9.15 (including)
Extlib Dan_kubb 0.9.2 (including) 0.9.2 (including)
Extlib Dan_kubb 0.9.3 (including) 0.9.3 (including)
Extlib Dan_kubb 0.9.4 (including) 0.9.4 (including)
Extlib Dan_kubb 0.9.5 (including) 0.9.5 (including)
Extlib Dan_kubb 0.9.6 (including) 0.9.6 (including)
Extlib Dan_kubb 0.9.7 (including) 0.9.7 (including)
Extlib Dan_kubb 0.9.8 (including) 0.9.8 (including)
Extlib Dan_kubb 0.9.9 (including) 0.9.9 (including)
Extlib Dan_kubb 0.9.10 (including) 0.9.10 (including)
Extlib Dan_kubb 0.9.11 (including) 0.9.11 (including)
Extlib Dan_kubb 0.9.12 (including) 0.9.12 (including)
Extlib Dan_kubb 0.9.13 (including) 0.9.13 (including)
Extlib Dan_kubb 0.9.14 (including) 0.9.14 (including)
Libextlib-ruby Ubuntu lucid *
Libextlib-ruby Ubuntu oneiric *
Libextlib-ruby Ubuntu precise *
Libextlib-ruby Ubuntu upstream *
Ruby-extlib Ubuntu quantal *
Ruby-extlib Ubuntu upstream *

References