Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-1931

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2006-1931
Last Modified 21 Aug 2010 12:45:34
Published 20 Apr 2006 05:02:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-1931

Summary

The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.

Vulnerable Systems

Application

  • Yukihiro Matsumoto Ruby 1.6

  • Yukihiro Matsumoto Ruby 1.6.1

  • Yukihiro Matsumoto Ruby 1.6.2

  • Yukihiro Matsumoto Ruby 1.6.3

  • Yukihiro Matsumoto Ruby 1.6.4

  • Yukihiro Matsumoto Ruby 1.6.5

  • Yukihiro Matsumoto Ruby 1.6.6

  • Yukihiro Matsumoto Ruby 1.6.7

  • Yukihiro Matsumoto Ruby 1.8

  • Yukihiro Matsumoto Ruby 1.8.1


References

CONFIRM - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189540

MISC - http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-dev/27787

MISC - ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-webrick-dos-1.patch

XF - ruby-socket-dos(26102)

UBUNTU - USN-273-1

BID - 17645

REDHAT - RHSA-2006:0427

OSVDB - 24972

SUSE - SUSE-SR:2006:012

MANDRIVA - MDKSA-2006:079

GENTOO - GLSA-200605-11

DEBIAN - DSA-1157

SECTRACK - 1015978

SECUNIA - 21657

SECUNIA - 20457

SECUNIA - 20064

SECUNIA - 20024

SECUNIA - 19804

SECUNIA - 19772

SECUNIA - 16904

MISC - ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-xmlrpc-dos-1.patch


Last Updated: 27 May 2016 10:42:16