CVE-2011-2686Ruby vulnerability

7 documents6 sources
Severity
5.0MEDIUMNVD
EPSS
0.7%
top 28.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 5
Latest updateMay 17

Description

Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages1 packages

NVDruby-lang/ruby1.8.7-334+9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g8g6-3p4h-6388: Ruby before 12022-05-17
CVEList
CVE-2011-2686: Ruby before 12011-08-05

📋Vendor Advisories

2
Ubuntu
Ruby vulnerabilities2012-02-28
Red Hat
ruby: Properly initialize the random number generator when forking new process2011-07-02

💬Community

2
Bugzilla
CVE-2011-2686 ruby: Properly initialize the random number generator when forking new process [fedora-all]2011-07-15
Bugzilla
CVE-2011-2686 CVE-2011-2705 CVE-2011-3009 ruby: Properly initialize the random number generator when forking new process2011-07-15
CVE-2011-2686 — Ruby-lang Ruby vulnerability | cvebase