Class: Dawn::Kb::CVE_2013_4164
- Inherits:
-
Object
- Object
- Dawn::Kb::CVE_2013_4164
- Includes:
- RubyVersionCheck
- Defined in:
- lib/dawn/kb/cve_2013_4164.rb
Overview
Automatically created with rake on 2013-11-26
Constant Summary
Constants included from BasicCheck
Instance Attribute Summary
Attributes included from RubyVersionCheck
Attributes included from BasicCheck
#applies, #aux_links, #check_family, #cve, #cvss, #cwe, #debug, #evidences, #fixes_version, #kind, #message, #mitigated, #name, #osvdb, #owasp, #priority, #release_date, #remediation, #ruby_version, #ruby_vulnerable_versions, #severity, #status, #target_version, #title
Instance Method Summary collapse
-
#initialize ⇒ CVE_2013_4164
constructor
A new instance of CVE_2013_4164.
Methods included from RubyVersionCheck
#is_same_version?, #is_vulnerable_engine?, #is_vulnerable_patchlevel?, #vuln?
Methods included from BasicCheck
#applies_to?, #cve_link, #cvss_score, families, #family, #family=, #lint, #mitigated?, #nvd_link, #osvdb_link, #rubysec_advisories_link
Methods included from Utils
#__debug_me_and_return, #debug_me, #debug_me_and_return_false, #debug_me_and_return_true
Constructor Details
#initialize ⇒ CVE_2013_4164
Returns a new instance of CVE_2013_4164.
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 |
# File 'lib/dawn/kb/cve_2013_4164.rb', line 7 def initialize = "Any time a string is converted to a floating point value, a specially crafted string can cause a heap overflow. This can lead to a denial of service attack via segmentation faults and possibly arbitrary code execution. Any program that converts input of unknown origin to floating point values (especially common when accepting JSON) are vulnerable." super({ :name=>"CVE-2013-4164", :cvss=>"not assigned", :release_date => Date.new(2013, 11, 23), :cwe=>"", :owasp=>"A9", :applies=>["rails", "sinatra", "padrino"], :kind=>Dawn::KnowledgeBase::RUBY_VERSION_CHECK, :message=>, :mitigation=>"All users are recommended to upgrade to Ruby 1.9.3 patchlevel 484, ruby 2.0.0 patchlevel 353 or ruby 2.1.0 preview2.", :aux_links=>["https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/"] }) self.safe_rubies = [{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"p484"}, {:engine=>"ruby", :version=>"2.0.0", :patchlevel=>"p353"}, {:engine=>"ruby", :version=>"2.1.0", :patchlevel=>"preview2"}] end |