CVE编号
CVE-2018-1000075利用情况
暂无补丁情况
官方补丁披露时间
2018-03-14漏洞描述
RubyGems版本Ruby 2.2系列:2.2.9及更早版本,Ruby 2.3系列:2.3.6及更早版本,Ruby 2.4系列:2.4.3及更早版本,Ruby 2.5系列:2.5.0及更早版本,在 trunk revision62422之前包含无限由ruby gem包tar header中的negative size漏洞引起的循环可能导致negative size,这可能导致无限循环。此漏洞似乎已在2.7.6中修复。解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://github.com/rubygems/rubygems/commit/92e98bf8f810bd812f919120d4832df51bc25d83
参考链接 |
|
---|---|
http://blog.rubygems.org/2018/02/15/2.7.6-released.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html | |
https://access.redhat.com/errata/RHSA-2018:3729 | |
https://access.redhat.com/errata/RHSA-2018:3730 | |
https://access.redhat.com/errata/RHSA-2018:3731 | |
https://access.redhat.com/errata/RHSA-2019:2028 | |
https://access.redhat.com/errata/RHSA-2020:0542 | |
https://access.redhat.com/errata/RHSA-2020:0591 | |
https://access.redhat.com/errata/RHSA-2020:0663 | |
https://github.com/rubygems/rubygems/commit/92e98bf8f810bd812f919120d4832df51bc25d83 | |
https://lists.debian.org/debian-lts-announce/2018/04/msg00000.html | |
https://lists.debian.org/debian-lts-announce/2018/04/msg00001.html | |
https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | |
https://lists.debian.org/debian-lts-announce/2019/05/msg00028.html | |
https://usn.ubuntu.com/3621-1/ | |
https://www.debian.org/security/2018/dsa-4219 | |
https://www.debian.org/security/2018/dsa-4259 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.2.9 |
|||||
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.3.6 |
|||||
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.4.3 |
|||||
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.5.0 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | ruby | * |
Up to (excluding) 4.0.0-36.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | ruby | * |
Up to (excluding) 2.0.0.648-36.amzn2.0.1 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | ruby | * |
Up to (excluding) 0.2.1-1.30.6.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_7 | ruby | * |
Up to (excluding) 1.8.24-1+deb7u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | ruby | * |
Up to (excluding) 1.5.6-9+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | ruby | * |
Up to (excluding) 1.7.26-1+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | ruby | * |
Up to (excluding) 3.2.0~rc.2-1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_26 | ruby | * |
Up to (excluding) 2.4.3-87.fc26 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | ruby | * |
Up to (excluding) 2.4.3-87.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | ruby | * |
Up to (excluding) 2.5.5-lp151.4.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | ruby | * |
Up to (excluding) 2.5.5-lp151.4.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | ruby | * |
Up to (excluding) 1.7.7-36.el7 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | ruby | * |
Up to (excluding) 2.1.9-19.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | ruby | * |
Up to (excluding) 2.1.9-19.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | ruby | * |
Up to (excluding) 2.3.1-2~16.04.7 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | ruby | * |
Up to (excluding) 2.5.1-1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...