CVE-2014-2734Ruby vulnerability

CWE-3995 documents5 sources
Severity
5.8MEDIUMNVD
EPSS
5.8%
top 9.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 24
Latest updateMay 17

Description

The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not a

CVSS vector

AV:N/AC:M/C:P/I:P/A:NExploitability: 8.6 | Impact: 4.9

Affected Packages1 packages

NVDruby-lang/ruby4 versions+3

🔴Vulnerability Details

2
GHSA
GHSA-6qq6-x75v-fgg7: ** DISPUTED ** The openssl extension in Ruby 22022-05-17
CVEList
CVE-2014-2734: The openssl extension in Ruby 22014-04-24

📋Vendor Advisories

1
Red Hat
ruby: SSL signature spoofing flaw2014-04-10

💬Community

1
Bugzilla
CVE-2014-2734 ruby: SSL signature spoofing flaw2014-04-25
CVE-2014-2734 — Ruby-lang Ruby vulnerability | cvebase