漏洞标题
N/A
漏洞描述信息
**争议**
在 Ruby 2.x 中,openssl 扩展程序在文件重新打开后未能正确维护进程内存的状态,这允许远程攻击者在 Ruby 脚本上下文中伪造签名,并在执行一定的文件操作序列后尝试签名验证。
注意:此问题已被 Ruby OpenSSL 团队和第三方人员争议,他们表示,原始演示 PoC 包含错误和冗余或不必要的复杂代码,似乎与该问题演示无关。截至 20140502,CVE 并未收到原始研究人员的任何公开评论。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Ruby 资源管理错误漏洞
漏洞描述信息
Ruby是日本软件开发者松本行弘所研发的一种跨平台、面向对象的动态类型编程语言。 Ruby 2.x版本的openssl扩展中存在安全漏洞,该漏洞源于程序没有正确管理进程内存的状态。远程攻击者可利用该漏洞在Ruby脚本的上下文中伪造签名。
CVSS信息
N/A
漏洞类别
资源管理错误