Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <506F2900.2060403@redhat.com>
Date: Fri, 05 Oct 2012 12:37:52 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        Vit Ondruch <vondruch@...hat.com>,
        Ruby Security Team <security@...y-lang.org>
Subject: Re: CVE Request -- ruby (1.8.x with patched CVE-2011-1005):
 Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/05/2012 09:26 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> 
> Originally, Common Vulnerabilities and Exposures assigned an
> identifier of CVE-2011-1005 to the following vulnerability:
> 
> The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 
> through 1.8.7-330, and 1.8.8dev allows context-dependent attackers
> to modify strings via the Exception#to_s method, as demonstrated by
> changing an intended pathname.
> 
> with the following upstream patch: [1]
> http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?revision=30903&view=revision
>
>  Based on later upstream patch for different (CVE-2012-4464 and
> CVE-2012-4466) issues: [2]
> http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
>
>  it was found that original upstream 1.8.x ruby patch for
> CVE-2011-1005 issue was not complete, when the NameError#to_s()
> method was used on / with Ruby objects (the test logic in
> 'test_to_s_taintness_propagation' test from [1] was actually
> reversed {Hint: Compare the test for Ruby Object cases in both [1]
> and [2]}, so the test returned success also on still vulnerable
> instances).
> 
> A different vulnerability than CVE-2011-1005, CVE-2012-4464, and
> CVE-2012-4466.
> 
> References: [3] https://bugzilla.redhat.com/show_bug.cgi?id=863484
> 
> This issue was discovered by Vit Ondruch of Red Hat.
> 
> Ruby Security Team previously in a private email to Vit confirmed 
> (still) presence of this issue on ruby 1.8.7 versions and provided 
> a patch for it: <snip> The behavior of SVN trunk is correct.
> 
> The fix for CVE-2011-1005 was insufficient, and NameError#to_s has
> a problem in 1.8.7.
> 
> Please apply the attached patch for 1.8.7.
> 
> -- Shugo Maeda
> 
> error.c.diff
> 
> --- error.c.orig	2012-10-04 23:26:42.000611741 +0900 +++ error.c
> 2012-10-04 23:26:48.960524245 +0900 @@ -665,9 +665,6 @@
> 
> if (NIL_P(mesg)) return rb_class_name(CLASS_OF(exc)); 
> StringValue(str); -    if (str != mesg) { -	OBJ_INFECT(str, mesg); 
> -    } return str; }
> 
> </snip>
> 
> Could you allocate a CVE identifier to this (for those package
> versions, which have applied patch for originally CVE-2011-1005
> already)?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team
> 

Please use CVE-2012-4481 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=5BI3
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.