USN-596-1: Ruby vulnerabilities

Publication date

26 March 2008

Overview

Ruby vulnerabilities


Packages

Details

Chris Clark discovered that Ruby's HTTPS module did not check for
commonName mismatches early enough during SSL negotiation. If a remote
attacker were able to perform machine-in-the-middle attacks, this flaw could
be exploited to view sensitive information in HTTPS requests coming from
Ruby applications. (CVE-2007-5162)

It was discovered that Ruby's FTPTLS, telnets, and IMAPS modules
did not check the commonName when performing SSL certificate checks.
If a remote attacker were able to perform machine-in-the-middle attacks,
this flaw could be exploited to eavesdrop on encrypted communications
from Ruby applications using these protocols. (CVE-2007-5770)

Chris Clark discovered that Ruby's HTTPS module did not check for
commonName mismatches early enough during SSL negotiation. If a remote
attacker were able to perform machine-in-the-middle attacks, this flaw could
be exploited to view sensitive information in HTTPS requests coming from
Ruby applications. (CVE-2007-5162)

It was discovered that Ruby's FTPTLS, telnets, and IMAPS modules
did not check the commonName when performing SSL certificate checks.
If a remote attacker were able to perform machine-in-the-middle attacks,
this flaw could be exploited to eavesdrop on encrypted communications
from Ruby applications using these protocols. (CVE-2007-5770)

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:


Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›