中危 Ruby 1.8.6/1.8.7/1.9 REXML 拒绝服务漏洞

CVE编号

CVE-2008-3790

利用情况

EXP 已公开

补丁情况

官方补丁

披露时间

2008-08-28
该漏洞EXP已公开传播,漏洞利用成本极低,建议您立即关注并修复。
漏洞描述
Ruby 1.8.6到1.8.6-p287,1.8.7到1.8.7-p72和1.9中的REXML模块允许依赖于上下文的攻击者通过具有递归嵌套实体的XML文档导致拒绝服务(CPU消耗) ,又名“XML entity explosion”。

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://groups.google.com/group/comp.lang.ruby/browse_thread/thread/19f69e8a08...
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://secunia.com/advisories/31602
http://secunia.com/advisories/32165
http://secunia.com/advisories/32219
http://secunia.com/advisories/32255
http://secunia.com/advisories/32256
http://secunia.com/advisories/32371
http://secunia.com/advisories/33178
http://secunia.com/advisories/33185
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200812-17.xml
http://support.apple.com/kb/HT3549
http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
http://weblog.rubyonrails.org/2008/9/3/rails-2-0-4-maintenance-release
http://www.debian.org/security/2008/dsa-1651
http://www.debian.org/security/2008/dsa-1652
http://www.openwall.com/lists/oss-security/2008/08/25/4
http://www.openwall.com/lists/oss-security/2008/08/26/1
http://www.openwall.com/lists/oss-security/2008/08/26/4
http://www.redhat.com/support/errata/RHSA-2008-0897.html
http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/
http://www.ruby-lang.org/security/20080823rexml/rexml-expansion-fix.rb
http://www.securityfocus.com/bid/30802
http://www.securitytracker.com/id?1020735
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2008/2428
http://www.vupen.com/english/advisories/2008/2483
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/44628
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://usn.ubuntu.com/651-1/
https://usn.ubuntu.com/691-1/
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 ruby-lang ruby 1.8.6 -
运行在以下环境
应用 ruby-lang ruby 1.8.7 -
运行在以下环境
应用 ruby-lang ruby 1.9 -
运行在以下环境
系统 centos_5 ruby-libs * Up to
(excluding)
1.8.5-5.el5_2.5
运行在以下环境
系统 opensuse_10.3 dhcp-client * Up to
(excluding)
3.0.6-24.4
运行在以下环境
系统 opensuse_11.0 dhcp-client * Up to
(excluding)
3.0.6-86.4
运行在以下环境
系统 opensuse_11.1 dhcp-client * Up to
(excluding)
3.1.1-6.5.1
运行在以下环境
系统 oracle_5 oraclelinux-release * Up to
(excluding)
1.8.5-5.el5_2.5
运行在以下环境
系统 redhat_5 irb * Up to
(excluding)
0:1.8.1-7.el4_7.1
运行在以下环境
系统 suse_11 ruby * Up to
(excluding)
1.8.7.p72-5.24
阿里云评分
5.1
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    EXP 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    传输被破坏
  • 服务器危害
    DoS
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-20 输入验证不恰当
阿里云安全产品覆盖情况