Ispravljen je propust otkriven u programskom paketu ruby kojeg napadač može iskoristiti za izvođenje napada uskraćivanja usluge (DoS napad).
Paket:
ruby 1.x
Operacijski sustavi:
Red Hat Enterprise Linux 6
Kritičnost:
6.8
Problem:
pogreška u programskoj funkciji
Iskorištavanje:
lokalno/udaljeno
Posljedica:
uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-4815
Izvorni ID preporuke:
RHSA-2012:0069-01
Izvor:
Red Hat
Problem:
Propust je posljedica pogreške u izračunu hash vrijednosti.
Posljedica:
Napadač može iskoristiti ranjivost za izvođenje napada uskraćivanja usluge (DoS) podmetanjem posebno oblikovanih ulaznih podataka aplikaciji koja sprema hash tablicu.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: ruby security update
Advisory ID: RHSA-2012:0069-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0069.html
Issue date: 2012-01-30
CVE Names: CVE-2011-4815
=====================================================================
1. Summary:
Updated ruby packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
Ruby is an extensible, interpreted, object-oriented, scripting language. It
has features to process text files and to do system management tasks.
A denial of service flaw was found in the implementation of associative
arrays (hashes) in Ruby. An attacker able to supply a large number of
inputs to a Ruby application (such as HTTP POST request parameters sent to
a web application) that are used as keys when inserting data into an array
could trigger multiple hash function collisions, making array operations
take an excessive amount of CPU time. To mitigate this issue, randomization
has been added to the hash function to reduce the chance of an attacker
successfully causing intentional collisions. (CVE-2011-4815)
Red Hat would like to thank oCERT for reporting this issue. oCERT
acknowledges Julian WÄ
Posljednje sigurnosne preporuke