Vulnerability Description
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Ruby | <= 1.8.5 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://secunia.com/advisories/31430Vendor Advisory
- http://secunia.com/advisories/31697Vendor Advisory
- http://secunia.com/advisories/32165Vendor Advisory
- http://secunia.com/advisories/32219Vendor Advisory
- http://secunia.com/advisories/32255Vendor Advisory
- http://secunia.com/advisories/32256Vendor Advisory
- http://secunia.com/advisories/32371Vendor Advisory
- http://secunia.com/advisories/32372Vendor Advisory
- http://secunia.com/advisories/33178Vendor Advisory
- http://secunia.com/advisories/35074Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200812-17.xml
- http://support.apple.com/kb/HT3549
- http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
FAQ
What is CVE-2008-3655?
CVE-2008-3655 is a vulnerability with a CVSS score of 7.5 (HIGH). Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allo...
How severe is CVE-2008-3655?
CVE-2008-3655 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3655?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Ruby.