CVE-2014-2734

Severity

57%

Complexity

86%

Confidentiality

81%

** DISPUTED ** The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher.

** DISPUTED ** The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher.

CVSS 2.0 Base Score 5.8. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).

Overview

First reported 11 years ago

2014-04-24 23:55:00

Last updated 10 years ago

2014-11-19 03:00:00

Affected Software

Ruby-lang Ruby 2.0

2.0

Ruby-lang Ruby 2.0.0

2.0.0

Ruby-lang Ruby 2.0.0-p0

2.0.0

Ruby-lang Ruby 2.0.0-p195

2.0.0

Ruby-lang Ruby 2.0.0-p247

2.0.0

Ruby-lang Ruby 2.0.0-preview1

2.0.0

Ruby-lang Ruby 2.0.0-preview2

2.0.0

Ruby-lang Ruby 2.0.0 rc1

2.0.0

Ruby-lang Ruby 2.0.0 rc2

2.0.0

ruby-lang Ruby 2.1

2.1

Ruby-lang Ruby 2.1preview1

2.1

ruby-lang Ruby 2.1.1

2.1.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.