Bug 212237
| Summary: | CVE-2006-5467 Ruby CGI multipart parsing DoS | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 4 | Reporter: | Josh Bressers <bressers> | ||||
| Component: | ruby | Assignee: | Akira TAGOH <tagoh> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Bill Huang <bhuang> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 4.0 | CC: | security-response-team | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | impact=moderate,reported=20061024,embargo=20061025,source=vendorsec | ||||||
| Fixed In Version: | RHSA-2006-0729 | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2006-11-08 15:51:34 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | |||||||
| Bug Blocks: | 213726 | ||||||
| Attachments: |
|
||||||
This issue should also affect RHEL2.1 and RHEL3 Created attachment 139389 [details]
Proposed patch
should be fixed in ruby-1.6.4-2.AS21.4, ruby-1.6.8-9.EL3.7 and ruby-1.8.1-7.EL4.7 built ruby-1.6.8-9.EL3.8 and ruby-1.8.1-7.EL4.8 An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0729.html |
Jeremy Kemper mailed this information to vendor-sec: Fix an exploitable bug in CGI multipart parsing which affects Ruby <= 1.8.5 when the input stream returns "" (empty string) instead of nil on EOF. Certain malformed multipart requests leave the parser in a non-terminating state, leaving the program vulnerable to denial of service attack. The fix more carefully checks for input stream EOF. affected: standalone CGI, Mongrel unaffected: FastCGI, mod_ruby, WEBrick This fully closes a previously-reported but partially-fixed vulnerability: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0983 http://www.securityfocus.com/bid/11618/info