Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2006-0604: irb


Vulnerability Assessment Details

RHSA-2006-0604: irb

Vulnerability Assessment Summary
Check for the version of the irb packages

Detailed Explanation for this Vulnerability Assessment


Updated ruby packages that fix security issues are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Ruby is an interpreted scripting language for object-oriented programming.

A number of flaws were found in the safe-level restrictions in Ruby. It
was possible for a possible hacker to create a carefully crafted malicious script
that can permit the bypass of certain safe-level restrictions.
(CVE-2006-3694)

Users of Ruby should update to these erratum packages, which contain a
backported patch and are not vulnerable to this issue.




Solution : http://rhn.redhat.com/errata/RHSA-2006-0604.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

IBM Server i5 Type 9405-520
$2500.0
IBM Server i5 Type 9405-520 pictureIBM 7316-TF3 17" KMM Server Rack Console LCD Monitor Rackmount w/ Rails
$159.95
IBM 7316-TF3 17IBM HX5 BLADECENTER SERVER TWO E7530 1.86GHZ 12GB NO HDD
$1499.0
IBM HX5 BLADECENTER SERVER TWO E7530 1.86GHZ 12GB NO HDD picture10 QTY - IBM / Edge 4GB (40GB Total) PC2 - 5300 DDR2 Server RAM
$31.95
10 QTY -  IBM / Edge 4GB (40GB Total)  PC2 - 5300  DDR2 Server RAM    picture


Discussions

No Discussions have been posted on this vulnerability.