FreeBSD : ruby-gems -- Algorithmic Complexity Vulnerability (742eb9e4-e3cb-4f5a-b94e-0e9a39420600)

medium Nessus Plugin ID 71071

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Ruby Gem developers report :

The patch for CVE-2013-4363 was insufficiently verified so the combined regular expression for verifying gem version remains vulnerable following CVE-2013-4363.

RubyGems validates versions with a regular expression that is vulnerable to denial of service due to backtracking. For specially crafted RubyGems versions attackers can cause denial of service through CPU consumption.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?1d9298d9

Plugin Details

Severity: Medium

ID: 71071

File Name: freebsd_pkg_742eb9e4e3cb4f5ab94e0e9a39420600.nasl

Version: 1.4

Type: local

Published: 11/25/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ruby19-gems, p-cpe:/a:freebsd:freebsd:ruby20-gems, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/24/2013

Vulnerability Publication Date: 9/24/2013

Reference Information

CVE: CVE-2013-4363