CVE
- Id
- 33772
- CVE No.
- CVE-2008-3655
- Status
- Candidate
- Description
- Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
- Phase
- Assigned (20080812)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
368060 | 33772 | CVE-2008-3655 | BUGTRAQ:20080831 rPSA-2008-0264-1 ruby | View |
368061 | 33772 | CVE-2008-3655 | URL:http://www.securityfocus.com/archive/1/archive/1/495884/100/0/threaded | View |
368062 | 33772 | CVE-2008-3655 | CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 | View |
368063 | 33772 | CVE-2008-3655 | CONFIRM:http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ | View |
368064 | 33772 | CVE-2008-3655 | CONFIRM:http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264 | View |
368065 | 33772 | CVE-2008-3655 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm | View |
368066 | 33772 | CVE-2008-3655 | CONFIRM:http://support.apple.com/kb/HT3549 | View |
368067 | 33772 | CVE-2008-3655 | APPLE:APPLE-SA-2009-05-12 | View |
368068 | 33772 | CVE-2008-3655 | URL:http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | View |
368069 | 33772 | CVE-2008-3655 | DEBIAN:DSA-1651 | View |
368070 | 33772 | CVE-2008-3655 | URL:http://www.debian.org/security/2008/dsa-1651 | View |
368071 | 33772 | CVE-2008-3655 | DEBIAN:DSA-1652 | View |
368072 | 33772 | CVE-2008-3655 | URL:http://www.debian.org/security/2008/dsa-1652 | View |
368073 | 33772 | CVE-2008-3655 | FEDORA:FEDORA-2008-8736 | View |
368074 | 33772 | CVE-2008-3655 | URL:https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html | View |
368075 | 33772 | CVE-2008-3655 | FEDORA:FEDORA-2008-8738 | View |
368076 | 33772 | CVE-2008-3655 | URL:https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html | View |
368077 | 33772 | CVE-2008-3655 | GENTOO:GLSA-200812-17 | View |
368078 | 33772 | CVE-2008-3655 | URL:http://security.gentoo.org/glsa/glsa-200812-17.xml | View |
368079 | 33772 | CVE-2008-3655 | REDHAT:RHSA-2008:0895 | View |
368080 | 33772 | CVE-2008-3655 | URL:http://www.redhat.com/support/errata/RHSA-2008-0895.html | View |
368081 | 33772 | CVE-2008-3655 | REDHAT:RHSA-2008:0897 | View |
368082 | 33772 | CVE-2008-3655 | URL:http://www.redhat.com/support/errata/RHSA-2008-0897.html | View |
368083 | 33772 | CVE-2008-3655 | UBUNTU:USN-651-1 | View |
368084 | 33772 | CVE-2008-3655 | URL:http://www.ubuntulinux.org/support/documentation/usn/usn-651-1 | View |
368085 | 33772 | CVE-2008-3655 | CERT:TA09-133A | View |
368086 | 33772 | CVE-2008-3655 | URL:http://www.us-cert.gov/cas/techalerts/TA09-133A.html | View |
368087 | 33772 | CVE-2008-3655 | BID:30644 | View |
368088 | 33772 | CVE-2008-3655 | URL:http://www.securityfocus.com/bid/30644 | View |
368089 | 33772 | CVE-2008-3655 | OVAL:oval:org.mitre.oval:def:11602 | View |
368090 | 33772 | CVE-2008-3655 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11602 | View |
368091 | 33772 | CVE-2008-3655 | SECUNIA:35074 | View |
368092 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/35074 | View |
368093 | 33772 | CVE-2008-3655 | VUPEN:ADV-2008-2334 | View |
368094 | 33772 | CVE-2008-3655 | URL:http://www.vupen.com/english/advisories/2008/2334 | View |
368095 | 33772 | CVE-2008-3655 | SECTRACK:1020656 | View |
368096 | 33772 | CVE-2008-3655 | URL:http://www.securitytracker.com/id?1020656 | View |
368097 | 33772 | CVE-2008-3655 | SECUNIA:31697 | View |
368098 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/31697 | View |
368099 | 33772 | CVE-2008-3655 | SECUNIA:32255 | View |
368100 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/32255 | View |
368101 | 33772 | CVE-2008-3655 | SECUNIA:32256 | View |
368102 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/32256 | View |
368103 | 33772 | CVE-2008-3655 | SECUNIA:33178 | View |
368104 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/33178 | View |
368105 | 33772 | CVE-2008-3655 | SECUNIA:31430 | View |
368106 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/31430 | View |
368107 | 33772 | CVE-2008-3655 | SECUNIA:32165 | View |
368108 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/32165 | View |
368109 | 33772 | CVE-2008-3655 | SECUNIA:32219 | View |
368110 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/32219 | View |
368111 | 33772 | CVE-2008-3655 | SECUNIA:32371 | View |
368112 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/32371 | View |
368113 | 33772 | CVE-2008-3655 | SECUNIA:32372 | View |
368114 | 33772 | CVE-2008-3655 | URL:http://secunia.com/advisories/32372 | View |
368115 | 33772 | CVE-2008-3655 | VUPEN:ADV-2009-1297 | View |
368116 | 33772 | CVE-2008-3655 | URL:http://www.vupen.com/english/advisories/2009/1297 | View |
368117 | 33772 | CVE-2008-3655 | XF:ruby-safelevel-security-bypass(44369) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
46424 | JVNDB-2008-001734 | PHP の memnstr 関数におけるバッファオーバーフローの脆弱性 | PHP の memnstr 関数には、explode 関数に関わる処理に不備があり、バッファオーバーフローの脆弱性が存在します。 | CVE-2008-3659 | 33772 | 6.4 | http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-001734.html | View |