Date: Sat, 16 Feb 2013 14:41:44 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r312355 - head/security/vuxml Message-ID: <201302161441.r1GEfik8019703@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Sat Feb 16 14:41:44 2013 New Revision: 312355 URL: http://svnweb.freebsd.org/changeset/ports/312355 Log: - Document ruby json issue Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Feb 16 14:21:33 2013 (r312354) +++ head/security/vuxml/vuln.xml Sat Feb 16 14:41:44 2013 (r312355) @@ -51,6 +51,55 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c79eb109-a754-45d7-b552-a42099eb2265"> + <topic>Ruby -- Denial of Service and Unsafe Object Creation Vulnerability in JSON</topic> + <affects> + <package> + <name>ruby</name> + <range><gt>1.9</gt></range> + <range><lt>1.9.3.385,1</lt></range> + </package> + <package> + <name>rubygem18-json</name> + <range><lt>1.7.7</lt></range> + </package> + <package> + <name>rubygem19-json</name> + <range><lt>1.7.7</lt></range> + </package> + <package> + <name>rubygem18-json_pure</name> + <range><lt>1.7.7</lt></range> + </package> + <package> + <name>rubygem19-json_pure</name> + <range><lt>1.7.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Aaron Patterson reports:</p> + <blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/4_YvCpLzL58"> + <p>When parsing certain JSON documents, the JSON gem can be coerced in + to creating Ruby symbols in a target system. Since Ruby symbols + are not garbage collected, this can result in a denial of service + attack.</p> + <p>The same technique can be used to create objects in a target system + that act like internal objects. These "act alike" objects can be + used to bypass certain security mechanisms and can be used as a + spring board for SQL injection attacks in Ruby on Rails.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-0269</cvename> + </references> + <dates> + <discovery>2013-02-11</discovery> + <entry>2013-02-16</entry> + </dates> + </vuln> + <vuln vid="d3e96508-056b-4259-88ad-50dc8d1978a6"> <topic>Ruby -- XSS exploit of RDoc documentation generated by rdoc</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201302161441.r1GEfik8019703>