漏洞信息详情
Ruby 安全漏洞
漏洞简介
Ruby是日本软件开发者松本行弘所研发的一种跨平台、面向对象的动态类型编程语言。
Ruby中存在HTTP响应拆分漏洞。远程攻击者可利用该漏洞向客户端展示恶意的内容。以下版本受到影响:Ruby 2.2.10之前版本,2.3.7之前的2.3.x版本,2.4.4之前的2.4.x版本,2.5.1之前的2.5.x版本,2.6.0-preview1版本。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
参考网址
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
来源:CONFIRM
链接:https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
来源:CONFIRM
链接:https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:3730
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2028
来源:UBUNTU
链接:https://usn.ubuntu.com/3685-1/
来源:BID
链接:https://www.securityfocus.com/bid/103684
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
来源:http-response-splitting-in-webrick-cve-2017-17742
链接:http-response-splitting-in-webrick-cve-2017-17742/
来源:CONFIRM
链接:https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
来源:SECTRACK
链接:http://www.securitytracker.com/id/1042004
来源:CONFIRM
链接:https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:3731
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html
来源:DEBIAN
链接:https://www.debian.org/security/2018/dsa-4259
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:3729
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4217-1/
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:2028
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191804-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1533/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2958/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2823/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4603/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157495/Red-Hat-Security-Advisory-2020-1963-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4448/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161987/Ubuntu-Security-Notice-USN-3685-2.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157821/Red-Hat-Security-Advisory-2020-2288-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1533.2/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157766/Red-Hat-Security-Advisory-2020-2212-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2542/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1852/
受影响实体
- Debian Debian_linux:7.0<!--2000-1-1-->
补丁
- Ruby 安全漏洞的修复措施<!--2017-12-19-->
还没有评论,来说两句吧...