Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-2780 advisory.
Multiple vulnerabilites in ruby2.3, interpreter of object-oriented scripting language Ruby, were discovered. CVE-2021-31799 In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 2.3.3, it is possible to execute arbitrary code via | and tags in a filename. CVE-2021-31810 An issue was discovered in Ruby through 2.3.3. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions). CVE-2021-32066 An issue was discovered in Ruby through 2.3.3. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the- middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a StartTLS stripping attack. For Debian 9 stretch, these problems have been fixed in version 2.3.3-1+deb9u10. We recommend that you upgrade your ruby2.3 packages.
For the detailed security status of ruby2.3 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/ruby2.3 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at:
https://wiki.debian.org/LTS
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the ruby2.3 packages.
For Debian 9 stretch, these problems have been fixed in version 2.3.3-1+deb9u10.
Plugin Details
File Name: debian_DLA-2780.nasl
Agent: unix
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:debian:debian_linux:ruby2.3-tcltk, p-cpe:/a:debian:debian_linux:ruby2.3-dev, cpe:/o:debian:debian_linux:9.0, p-cpe:/a:debian:debian_linux:ruby2.3-doc, p-cpe:/a:debian:debian_linux:libruby2.3, p-cpe:/a:debian:debian_linux:ruby2.3
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: Exploits are available
Patch Publication Date: 10/13/2021
Vulnerability Publication Date: 5/20/2021