Debian DSA-1411-1 : libopenssl-ruby - programming error

medium Nessus Plugin ID 28300

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in Ruby, an object-oriented scripting language. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2007-5162 It was discovered that the Ruby HTTP(S) module performs insufficient validation of SSL certificates, which may lead to man-in-the-middle attacks.

- CVE-2007-5770 It was discovered that the Ruby modules for FTP, Telnet, IMAP, POP and SMTP perform insufficient validation of SSL certificates, which may lead to man-in-the-middle attacks.

Solution

Upgrade the libopenssl-ruby packages.

For the old stable distribution (sarge) these problems have been fixed in version 0.1.4a-1sarge1. Packages for sparc will be provided later.

The stable distribution (etch) no longer contains libopenssl-ruby.

See Also

https://security-tracker.debian.org/tracker/CVE-2007-5162

https://security-tracker.debian.org/tracker/CVE-2007-5770

http://www.debian.org/security/2007/dsa-1411

Plugin Details

Severity: Medium

ID: 28300

File Name: debian_DSA-1411.nasl

Version: 1.16

Type: local

Agent: unix

Published: 11/26/2007

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libopenssl-ruby, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 11/24/2007

Reference Information

CVE: CVE-2007-5162, CVE-2007-5770

CWE: 287

DSA: 1411